last executing test programs: 33m47.527779481s ago: executing program 32 (id=14): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x50) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xfffffffffffffff8, 0x3}, 0x0, 0x0, 0x2, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0), 0x4) socket$kcm(0xa, 0x2, 0x73) socket$kcm(0x29, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000180000003d030100000000009500f000000000007126000000000000bf67000000000000360602000fff07106706000020000000170200000ee60000bf250000000000002d350000000000006507000002080000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad03000000000000720400000000000014000000000000009500000000000000db13d5d8b741f2cdaabc8383c8f56b8c2b84a800ea6553f304000000815dcf00c3eebc52267b042d19"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000c"], 0x48) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r2}, &(0x7f0000000080), &(0x7f0000000240)=r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r4 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r4, &(0x7f0000000140)={'full'}, 0xfffffdef) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x5452, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x8a, 0x7, 0x0, 0x3, 0x0, 0x10000000000, 0x8880, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={0x0, 0x6}, 0x0, 0x3, 0x0, 0x6, 0x7, 0x4, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x4b, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x4f3e, 0xb54b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffd, 0x2, @perf_bp={0x0, 0x8}, 0x11efa, 0x4, 0x98, 0x6, 0x4, 0xfffff26d, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, 0x0, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001001f000404000001007d60b7030000000000006a0a00fe00000100850000000d000000b7000000000000009500000000000000c74396c8e3ebbadc20e5a7ef8c9ac1465cbf188ef10871b81ac7553358380b3a1f59916ffc9bf0bdf81524f07fb2819bf5774fedda52e39c90af27db5b56024df96b4673b4e8d5467e114604ea09b290a248a120c9c6cd87cef9000000a39c15a7ef365cc27dfeac7b9b0e9048517354b0ca4f9cf8b59ee6fa003fe1f2c4c15f20a07db4583a462d8be6602186fd68ee14a19ea2eb42122b8635a66ce6b5b92356081bc0f18a0ca83dbc089a9813c1efa26001b3f486ebfaae85c4d0b96778478ae5355e6f923b11056969f486f80a35f7f2339704fa93fa915ab8e1e0d7f31ebd19455e6827cd493907bf9d0000000000000000000000004e1fa60acabcf0553910ca2e5ea499fd5889dde9261f0848a5b8af657bfc96049308e8953431b269053627a1523551c160c813969925a892d266792352ec0204596a37ce8d6d260b32239bddbce2e79f93cb5a0ad897adb53b397d07c50f84b74f2605a565ee149016aa75ea31c0087dcd821b47c8b36efc6da4fb2ea7f1f36c85856b73ac9872babc62149699b6b8c796a79d833eb4b5ca668d430db5653a2b3c5b87e17ca1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x94) 24m26.794177174s ago: executing program 33 (id=2150): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r1, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) socket$kcm(0x10, 0x2, 0x0) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) 24m26.663880562s ago: executing program 34 (id=2152): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 24m11.593893193s ago: executing program 5 (id=2160): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x8, 0x0, 0x1, 0x0, 0x4}], &(0x7f00000002c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffff24}, 0x94) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x400007, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xffffffff}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0x1}], 0x1, 0x0, 0x0, 0xa6820000}, 0x0) 24m11.284152431s ago: executing program 5 (id=2166): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 23m59.658720871s ago: executing program 5 (id=2169): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 23m54.691313331s ago: executing program 35 (id=2172): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 23m54.341900901s ago: executing program 36 (id=2167): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0xf, 0x3, 0x2) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0}, 0x0) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 23m54.064039668s ago: executing program 5 (id=2174): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 23m53.723913058s ago: executing program 37 (id=2168): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 23m37.678194166s ago: executing program 38 (id=2174): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m55.832242033s ago: executing program 7 (id=2177): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x8, 0x0, 0x1, 0x0, 0x4}], &(0x7f00000002c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffff24}, 0x94) sendmsg$inet(r1, 0x0, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x400007, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xffffffff}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1b, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0x0) 22m51.628820878s ago: executing program 7 (id=2178): r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m49.812421725s ago: executing program 7 (id=2179): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m49.358874301s ago: executing program 9 (id=2180): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x0, 0x0, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m45.732573083s ago: executing program 9 (id=2181): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x1, 0x8, 0x0, 0x1, 0x0, 0x4}], &(0x7f00000002c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffff24}, 0x94) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x400007, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xffffffff}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1b, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0x0) 22m45.368894915s ago: executing program 9 (id=2182): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m44.123402067s ago: executing program 7 (id=2183): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m39.411287913s ago: executing program 9 (id=2185): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000240)="b9ff0331684426", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m39.103711941s ago: executing program 1 (id=2186): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000240)="b9ff0331684426", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x0, 0x0, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m38.718885934s ago: executing program 7 (id=2187): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r3}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m36.378117081s ago: executing program 9 (id=2188): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m36.22445555s ago: executing program 1 (id=2189): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) socket$kcm(0xa, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r3}, 0x8) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'pimreg1\x00', 0x400}) setsockopt$sock_attach_bpf(r1, 0x6, 0x5, &(0x7f0000000040)=r3, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000002380)=@framed={{0x18, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd}, [@call={0x85, 0x0, 0x0, 0x30}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1200}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40}, 0x94) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f848310000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 22m35.54047631s ago: executing program 1 (id=2190): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000002c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffff24}, 0x94) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x400007, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xffffffff}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1b, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r4}, 0x8) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'pimreg1\x00', 0x400}) setsockopt$sock_attach_bpf(r1, 0x6, 0x5, &(0x7f0000000040)=r4, 0x4) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000002380)=@framed={{0x18, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd}, [@call={0x85, 0x0, 0x0, 0x30}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1200}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40}, 0x94) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f848310000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 22m34.977057852s ago: executing program 1 (id=2191): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000240)="b9ff0331684426", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 22m33.98788621s ago: executing program 9 (id=2192): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m33.82380666s ago: executing program 7 (id=2193): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r3}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m32.906914294s ago: executing program 1 (id=2194): socket$kcm(0x10, 0x2, 0x0) socket$kcm(0xa, 0x2, 0x0) socket$kcm(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0xf, 0x3, 0x2) socket$kcm(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10c002, 0xac5d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0xc0}, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888100", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 22m31.976187188s ago: executing program 1 (id=2195): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m16.341742122s ago: executing program 39 (id=2193): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r3}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m9.861876801s ago: executing program 40 (id=2192): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 22m6.79902412s ago: executing program 41 (id=2195): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 21m24.537540731s ago: executing program 2 (id=2196): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) sendmsg$inet(r1, 0x0, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) socket$kcm(0xa, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r3}, 0x8) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'pimreg1\x00', 0x400}) setsockopt$sock_attach_bpf(r1, 0x6, 0x5, &(0x7f0000000040)=r3, 0x4) r5 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000002380)=@framed={{0x18, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd}, [@call={0x85, 0x0, 0x0, 0x30}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1200}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40}, 0x94) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f848310000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 21m22.68688541s ago: executing program 2 (id=2202): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 21m22.582195586s ago: executing program 8 (id=2171): r0 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 21m17.163804052s ago: executing program 8 (id=2206): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x0, 0x0, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 21m13.425757181s ago: executing program 8 (id=2209): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0x14, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14f088a8", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x0, 0x0, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 21m12.721153992s ago: executing program 2 (id=2210): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x1ff, 0x200}, 0x8000, 0xcdd, 0x43a1bd76, 0x4, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='^+,!z,-\x00') r1 = socket$kcm(0x2, 0x200000000000001, 0x106) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), &(0x7f00000002c0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x1a, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffff24}, 0x94) sendmsg$inet(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x30004001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x8}, 0x7602, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$kcm(0xa, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x400007, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0xffffffff}, 0x50) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, 0x0) r3 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000380)={&(0x7f0000000040)={0xa, 0xa, @local}, 0x1b, &(0x7f0000000180)=[{&(0x7f0000000080)="a2", 0xff0e}], 0x4, 0x0, 0x0, 0xa6820000}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x26e1, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r4}, 0x8) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'pimreg1\x00', 0x400}) setsockopt$sock_attach_bpf(r1, 0x6, 0x5, &(0x7f0000000040)=r4, 0x4) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000002380)=@framed={{0x18, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd}, [@call={0x85, 0x0, 0x0, 0x30}, @printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1200}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40}, 0x94) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000940)="2e00000010008188e6b62aa73772cc9f1ba1f848310000005e140602000000000e000a001000000002800000128c", 0x2e}], 0x1}, 0x0) 21m11.376606671s ago: executing program 2 (id=2212): r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x18000000000002a0, 0xb, 0x0, &(0x7f0000000240)="b9ff03316844268cb89e14", 0x0, 0x9, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0500000001000000020004000400000000000000", @ANYRES32, @ANYBLOB="0000000000000000000d00000000010000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20000, 0x0, 0x0, 0x0, 0x0, 0xda}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) syz_clone(0xc920000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_subtree(r5, &(0x7f0000000140), 0x2, 0x0) syz_clone(0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) write$cgroup_subtree(r6, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 21m10.748833057s ago: executing program 8 (id=2213): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 21m3.664495672s ago: executing program 2 (id=2216): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x4) r2 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000f80)=ANY=[], 0x5) r3 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r3}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 20m56.550814038s ago: executing program 2 (id=2220): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 20m53.554397353s ago: executing program 42 (id=2213): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 20m43.246684066s ago: executing program 43 (id=2220): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x0, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_bp={0x0}, 0x0, 0x10000, 0x9e4, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x8, 0x4, 0x4, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004"], 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r2 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r2, &(0x7f0000003540)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r3 = openat$cgroup_int(r0, &(0x7f0000000340)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000f80)=ANY=[], 0x5) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f00000001c0)={r4}) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f00000000c0)=""/199, 0xc7}, {&(0x7f00000030c0)=""/4098, 0x1002}, {&(0x7f0000002080)=""/4111, 0x100f}, {&(0x7f0000000000)=""/92, 0x5c}], 0x4}, 0x40010022) 37.51511029s ago: executing program 4 (id=6714): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x400000, 0x6, 0xa66e}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$kcm(0x2b, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x58}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x20, 0xe, 0x0, &(0x7f00000012c0)="c1dfb080cd21d308098ee6883f63", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 34.447041659s ago: executing program 4 (id=6720): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000072000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={0x0, 0x8}, 0x40, 0x0, 0x0, 0x0, 0x7, 0x0, 0xffff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 23.672218911s ago: executing program 4 (id=6743): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x2, 0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) unlink(&(0x7f0000000340)='./file0\x00') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x4, 0x1, 0x0, 0x7ff2, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x14141, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = socket$kcm(0x25, 0x1, 0x0) recvmsg$kcm(r2, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x40010102) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d80000002000811f4e81f782db44b90402000000e8fe55a1180015000600142603600e1209000a0000000401a80016000a00114006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee0808856e408e8d8ef52b49816277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006d8df969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970100040000", 0xd8}], 0x1}, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x9) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r7) write$cgroup_int(r7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0], 0x0, 0x29, &(0x7f00000008c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000900), &(0x7f00000009c0), 0x8, 0x4a, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x2a, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000200000000000000060000001811000072b955049eafc795cc671a3ba780f1c192c4eba87c719f9f4131caafa089e42e5b97b485e9031963ff5e74bf891dabf4e45166", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018400000ffffffff000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000852000000100000018010000"], &(0x7f0000000400)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x3, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000bc0)={0x4, 0x10, 0x1, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000c00)=[{0x5, 0x5, 0xe, 0xb}], 0x10, 0xe42a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000680)="76389e6a655855", 0x0, 0x10001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 23.195546599s ago: executing program 4 (id=6745): r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000003c0)=[{}, {0x10000002}]}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r3, 0x10) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x75, &(0x7f0000000000)=r7, 0x8) 22.959281653s ago: executing program 4 (id=6746): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe2f8, 0xf1}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x23, 0x2, 0x0) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r5], 0x12) 22.424682795s ago: executing program 4 (id=6749): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa105000000000000000000f8ffffffb702000008000000b7030000000000008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)=0xffffffbfffffffe1) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r2, 0x0) syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x3ffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e000001000000000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x90ffffff}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r3, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r5) r6 = openat$cgroup_ro(r5, &(0x7f0000000380)='cpuacct.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)=@o_path={&(0x7f00000003c0)='./file0\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b70300000000000c8500000083000000bf0900000000000055090100ffffffec9500000000000000bf91000000000000e66af6f5fae934b6bab7020000010000008500000084000000b70f0000000000009500000000"], &(0x7f0000000340)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x25, r6, 0x8, &(0x7f0000000400)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r7, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b705000000000000850000007500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 9.208275829s ago: executing program 6 (id=6771): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x3, 0x3, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x8, 0x2, 0x4}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c3a00000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000080000850000007200000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9c, 0x1, 0x0, 0x0, 0x0, 0x5, 0x40200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x5, 0xb, &(0x7f00000000c0)=ANY=[@ANYBLOB="18080000000000000000000000000000180400002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000009000000850000000600000095"], &(0x7f0000000c80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x6, 0x4}, 0x80000, 0xca, 0x0, 0x0, 0x4b, 0x400000, 0x0, 0x0, 0xe, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0x1c0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRES8=r3], 0x9a) 7.035487927s ago: executing program 44 (id=6749): perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa105000000000000000000f8ffffffb702000008000000b7030000000000008500000006000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)=0xffffffbfffffffe1) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r2, 0x0) syz_clone(0x20083500, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x630c1100, 0x0, 0x3ffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="180000000e000001000000000400000007010000080700007500fcff0000000095000000d3031a00041f8ea47c2eb2b7639c2ad3a4c89eb40634ab9b5ade7978eb59ff70cd62adbe9c31865cf39dc9e93813d9433f34dad576b1897b3533f883f9e873d9c435ab89afdd4ff0c24c0053f1721e9dc694f461734e10ea76584696317ca540336bc0e60e7d6d44484e01102b1c830d2630c3932755946ba8848b0d93caec1f4d89f99dcd2e9cb4d3646bc48d7ece5cbb87cdd67955"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x90ffffff}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$MAP_CREATE(0xb00000000000000, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r3, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r5 = bpf$ITER_CREATE(0xb, 0x0, 0x0) close(r5) r6 = openat$cgroup_ro(r5, &(0x7f0000000380)='cpuacct.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000440)=@o_path={&(0x7f00000003c0)='./file0\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b70300000000000c8500000083000000bf0900000000000055090100ffffffec9500000000000000bf91000000000000e66af6f5fae934b6bab7020000010000008500000084000000b70f0000000000009500000000"], &(0x7f0000000340)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, 0x25, r6, 0x8, &(0x7f0000000400)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r7, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x11, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ffffffff000000000000000085000000a8000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b705000000000000850000007500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1f, 0x11, &(0x7f0000000200)=ANY=[], &(0x7f0000000b00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6.047839285s ago: executing program 6 (id=6774): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x400000, 0x6, 0xa66e}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) socket$kcm(0x2b, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x58}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x20, 0xe, 0x0, &(0x7f00000012c0)="c1dfb080cd21d308098ee6883f63", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 4.908400812s ago: executing program 6 (id=6779): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'cpuacct'}]}, 0x9) 4.76033158s ago: executing program 6 (id=6780): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000440)=ANY=[], 0x0, 0xfffffffe, 0x0, 0x0, 0x727c45cd4283345, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000300)=r4) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 4.697498154s ago: executing program 3 (id=6781): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xfd, 0x4, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x1000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 4.534291884s ago: executing program 3 (id=6782): mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x3a) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) socketpair(0x2, 0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) unlink(&(0x7f0000000340)='./file0\x00') r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) openat$cgroup_procs(r0, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x1) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x52, 0x1, 0x4, 0x1, 0x0, 0x7ff2, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x14141, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x4, &(0x7f0000000c80)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) r2 = socket$kcm(0x25, 0x1, 0x0) recvmsg$kcm(r2, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0x40010102) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000940)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="d80000002000811f4e81f782db44b90402000000e8fe55a1180015000600142603600e1209000a0000000401a80016000a00114006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee0808856e408e8d8ef52b49816277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006d8df969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e970100040000", 0xd8}], 0x1}, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xa, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000020000007b8a00fe0000000087080000000000007b8af0ff00000000bda100000000000027000000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b704000008000000850000004900000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000300), 0x9) r7 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r7) write$cgroup_int(r7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, &(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000880)=[0x0], 0x0, 0x29, &(0x7f00000008c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000900), &(0x7f00000009c0), 0x8, 0x4a, 0x8, 0x8, &(0x7f0000000a00)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x2a, &(0x7f0000000d80)=ANY=[@ANYBLOB="180000000200000000000000060000001811000072b955049eafc795cc671a3ba780f1c192c4eba87c719f9f4131caafa089e42e5b97b485e9031963ff5e74bf891dabf4e45166", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018400000ffffffff000000000000000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000852000000100000018010000"], &(0x7f0000000400)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x3, '\x00', r8, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000bc0)={0x4, 0x10, 0x1, 0x3}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000c00)=[{0x5, 0x5, 0xe, 0xb}], 0x10, 0xe42a}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000007c0)={r6, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000680)="76389e6a655855", 0x0, 0x10001, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.720620791s ago: executing program 0 (id=6786): perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={0x0}, 0x21, 0x0, 0x0, 0x6, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1000000000000002, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x10, 0x3, 0x10) socket$kcm(0x2, 0x922000000001, 0x106) socket$kcm(0x10, 0x2, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x400000, 0x6, 0xa66e}, 0x0, 0x1, 0xffffffffffffffff, 0x1) socket$kcm(0x2, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) socket$kcm(0x2b, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x10}}], 0x58}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x20, 0xe, 0x0, &(0x7f00000012c0)="c1dfb080cd21d308098ee6883f63", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 3.355104852s ago: executing program 0 (id=6787): r0 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="d7eab112856b60b6a3e0e2dbde6c3d5e7680491920639d480b6b5b0e6328733b2a118af085970758b35b8eb69a86eb1e67bce340dd99e45bcdcadc74f805a09abbf42c5735c0c0bfeb02c6eba50461c506405541b1d81412f4d6e0409c8ed01a24a00c19c619b8189c043fcbfcf7e0dae6fa040957389be6376784", 0x7b}, {&(0x7f0000001b40)="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", 0x546}], 0x2}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="c8fec1123a", 0x5}], 0x1}, 0x0) 3.22847717s ago: executing program 0 (id=6788): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x1, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa}, 0x8, 0xc8, 0x9, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1200000000}, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x96, 0x1, 0x0, 0x81, 0x0, 0x8000000000000005, 0x19188, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x4, @perf_bp={0x0, 0x9}, 0x105563, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0f00000001"], 0x50) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00000000db5b686158bb"], 0xfdef) 3.109545067s ago: executing program 0 (id=6789): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) openat$tun(0xffffffffffffff9c, 0x0, 0x8040, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}], 0x40}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 1.489438343s ago: executing program 6 (id=6790): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xfd, 0x4, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x1000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 1.305107013s ago: executing program 3 (id=6791): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b28, &(0x7f0000000000)={'wlan1\x00', @random="0100"}) r0 = socket$kcm(0x2, 0x5, 0x84) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x6e, &(0x7f0000000000)=r3, 0x10) r4 = socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r4, 0x84, 0x75, &(0x7f0000000000)=r7, 0x8) 1.231128287s ago: executing program 6 (id=6792): r0 = gettid() r1 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x403, 0xf6103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffffff}, r0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x2a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0xb, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x1}, 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b00)={0x18, 0x8, &(0x7f0000000200)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, @alu={0x7, 0xf4a4ba0eb22c5f5, 0x9, 0x9, 0x1, 0x10, 0x10}, @alu={0x7, 0x0, 0x1, 0xa, 0x5, 0x0, 0x1}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0xfffffff4}, @map_idx_val={0x18, 0x6, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000680)='syzkaller\x00', 0x1, 0xbd, &(0x7f0000000800)=""/189, 0x40f00, 0x20, '\x00', r6, 0x0, r7, 0x8, &(0x7f0000000900)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000940)={0x2, 0xe, 0xfffffffd, 0x400}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000980)=[r5, r5], &(0x7f00000009c0)=[{0x1, 0x2, 0xf, 0x3}, {0x2, 0x2, 0xa, 0x1}, {0x3, 0x2, 0x10, 0xa}, {0x2, 0x3, 0x8, 0x1485f2bc23315f78}], 0x10, 0x9}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x9, 0x2, 0x9, 0x28200, r5, 0x4, '\x00', r6, r2, 0x1, 0x0, 0x2, 0xffffffffffffffff}, 0x50) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000f0cd00000000000004000000850000000500"], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r8, r9, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)=r4}, 0x20) setsockopt$sock_attach_bpf(r4, 0x1, 0x7, &(0x7f0000000000), 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000a00)=0xffffffff) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={&(0x7f0000000000)="8894e38a6b53795dd26c051448dd5751942d6617568b415ab7b5935be5d3a60f7d667f546025026a8361136204900c5984ad9b3f57028b89aa1ad3cb7ad313493ff48b0d884d0235ee0832a43784d010062abe82b320d68e460e7042051dab811024c36af309e5c9533e464649335ab78a08d38100c2913ad4bd0b52a0dfe75261527c2a78242b74223700766b0e2607625a", &(0x7f00000000c0)=""/221, &(0x7f0000000280)="60da9434d396eec960e66b2fc1672056063dc047c2414938a20146f2e5be23aba2a5250d08cd84e935ddf1e8a70c874bf67020b696e3600d0eaf4077bbd38c50d28877e2cd77d81bf34b275a565df9fe488ad5ca4a21e1a38fa65f1ae4218a4b97ca5bbb344aa5c18d143d1639b7feb9df3676b5ea970311f19ee84946abec6cb317e4bd82d7f39f04f62d450ce082009b98e73e28994e74b7425910d3d8358f36771e18366ff53c23c91c6b0a20a829c18a27cd", &(0x7f0000001040)="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", 0x9, r10}, 0x38) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000800000000000000000001811", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r11) syz_clone(0x60000400, 0x0, 0x0, 0x0, 0x0, 0x0) r12 = openat$tun(0xffffffffffffff9c, 0x0, 0x20702, 0x0) ioctl$TUNSETQUEUE(r12, 0x400454d9, &(0x7f0000000140)={'veth0_macvtap\x00', 0x400}) ioctl$TUNDETACHFILTER(r12, 0x401054d6, 0x0) 1.230594777s ago: executing program 0 (id=6793): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x16, 0x2, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, @perf_bp={0x0, 0x6}, 0x100000, 0xca, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe2f8, 0xf1}, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x1, 0x84) syz_open_procfs$namespace(0x0, &(0x7f0000001000)='ns/pid_for_children\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0xffffffffffffffff}, 0x828, 0x0, 0x0, 0x0, 0x9, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x23, 0x2, 0x0) syz_open_procfs$namespace(0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}, 0x100) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="85feff0fc9"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x94) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[@ANYRES8=r1, @ANYRES8=r4], 0x12) 863.890179ms ago: executing program 3 (id=6794): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="8c38f0ff"], 0x0, 0x1, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0xa, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000c9"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1d38}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa067707"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x88be, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 202.768458ms ago: executing program 3 (id=6795): r0 = socket$kcm(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000001340)={0x2, 0x6, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000001580)}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000100)="d7eab112856b60b6a3e0e2dbde6c3d5e7680491920639d480b6b5b0e6328733b2a118af085970758b35b8eb69a86eb1e67bce340dd99e45bcdcadc74f805a09abbf42c5735c0c0bfeb02c6eba50461c506405541b1d81412f4d6e0409c8ed01a24a00c19c619b8189c043fcbfcf7e0dae6fa040957389be6376784", 0x7b}, {&(0x7f0000001b40)="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", 0x546}], 0x2}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="c8fec1123a", 0x5}], 0x1}, 0x0) 62.534836ms ago: executing program 0 (id=6796): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000020000008500000086", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000300)=r2) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 0s ago: executing program 3 (id=6797): perf_event_open(&(0x7f0000000800)={0x4, 0x80, 0xcb, 0x0, 0x0, 0x2, 0x0, 0x7, 0x1140, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9106, 0x0, @perf_config_ext={0xfff, 0x4}, 0x850, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x14, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800008b00000000000000000000000061100000001000009500000700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) socketpair(0x10, 0x2, 0x9, &(0x7f0000000ac0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) sendmsg$unix(r0, &(0x7f0000000a40)={&(0x7f00000008c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000940)="76c6636f61c53801ea1e38d200a7256952435f215e2af3ded9e80898670420a0da72615ce8e6cce19f87a3dd066d2f6ab2c34a11d1f55ea310d36e521924aee7fdde5f012925c7f84cc42159f1adf5d85a8465ae3b765db2903c3293f972eeaa47a062fe617adbbf8a46c517d85467a2905ee8efbb0cb7859311126681b47543b54f4ef66c03ebfbaaa03ddfd9f6854357c5b4603a224d6337477eeb217e07ad4127fd69773f88000a625bfd01151c1773484eda7d527b9aeb5d5a6535307d5700c910555349f937d04b130f5be3029b95efa2747bd8ff66e25804d8bb963d131347a6d24b64", 0xe6}], 0x1, 0x0, 0x0, 0x20000010}, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x401c5820, &(0x7f0000000080)=0xc54e) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r2, 0x58, &(0x7f0000000340)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110c230000) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047451, 0xf0ff1f00000000) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1b, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xbd, 0x5, 0xa0, 0x7, 0x0, 0x80000003, 0x4c1d4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xdfffffff, 0x0, @perf_bp={&(0x7f0000000200), 0xf}, 0x2, 0x2000000000001, 0x7, 0x4, 0x81, 0x8, 0x9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f0, &(0x7f0000000080)) kernel console output (not intermixed with test programs): .962643][T14504] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 918.003861][T14504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 918.023525][T14504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 918.035082][T14504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 918.046037][T14504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 918.060263][T14504] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 918.071371][T14504] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 918.084868][T14504] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 918.127207][T14504] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.145252][T14504] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.163661][T14504] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.175080][T14504] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 918.540188][T14776] netlink: 'syz.3.2258': attribute type 10 has an invalid length. [ 918.572002][T14776] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 918.679094][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 918.716254][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 918.796614][ T3479] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 918.821856][ T3479] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 921.739162][T14797] netlink: 'syz.3.2260': attribute type 10 has an invalid length. [ 921.757084][T14797] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 921.970707][T14804] netlink: 'syz.4.2261': attribute type 10 has an invalid length. [ 922.031751][T14804] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 922.896786][T14819] netlink: 'syz.4.2263': attribute type 10 has an invalid length. [ 922.904918][T14819] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 928.856183][T13290] Bluetooth: hci5: command 0x0406 tx timeout [ 928.862337][T13294] Bluetooth: hci3: command 0x0406 tx timeout [ 930.721226][T14878] netlink: 'syz.0.2271': attribute type 10 has an invalid length. [ 930.754878][T14878] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 932.295789][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 932.302150][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 937.347997][T14936] netlink: 'syz.4.2278': attribute type 10 has an invalid length. [ 937.391565][T14936] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 946.460430][T15031] netlink: 'syz.3.2290': attribute type 10 has an invalid length. [ 946.528109][T15031] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 955.219876][T15137] netlink: 'syz.0.2303': attribute type 10 has an invalid length. [ 955.297602][T15137] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 960.570399][T15239] mac80211_hwsim hwsim66 wlan1: entered promiscuous mode [ 960.605859][T15239] mac80211_hwsim hwsim66 wlan1: entered allmulticast mode [ 963.587393][T15291] syzkaller0: entered promiscuous mode [ 963.592945][T15291] syzkaller0: entered allmulticast mode [ 963.618138][ T5087] Bluetooth: hci0: ISO packet for unknown connection handle 0 [ 971.828004][T15418] syz.0.2369[15418] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 972.258179][T15435] syzkaller0: entered promiscuous mode [ 972.280035][T15435] syzkaller0: entered allmulticast mode [ 974.100991][T15475] syz_tun: refused to change device tx_queue_len [ 976.991029][T15536] xfrm0: entered allmulticast mode [ 977.740030][T15544] syzkaller0: entered promiscuous mode [ 977.794861][T15544] syzkaller0: entered allmulticast mode [ 981.424520][T15596] syzkaller0: entered promiscuous mode [ 981.434408][T15596] syzkaller0: entered allmulticast mode [ 984.010199][T15605] syzkaller0: entered promiscuous mode [ 984.016071][T15605] syzkaller0: entered allmulticast mode [ 993.238747][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 993.254745][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 993.772878][T15751] bridge0: port 2(bridge_slave_1) entered disabled state [ 993.780399][T15751] bridge0: port 1(bridge_slave_0) entered disabled state [ 993.788717][T15751] bridge0: entered allmulticast mode [ 1002.046511][T15926] mac80211_hwsim hwsim66 wlan1: left promiscuous mode [ 1003.237269][T15964] syz.6.2483[15964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1005.585710][ T51] Bluetooth: hci0: command 0x0406 tx timeout [ 1009.419886][T16073] mac80211_hwsim hwsim66 wlan1: left allmulticast mode [ 1010.683998][ T51] Bluetooth: hci1: command 0x0406 tx timeout [ 1011.233733][T16101] syzkaller0: entered promiscuous mode [ 1011.253245][T16101] syzkaller0: entered allmulticast mode [ 1015.213996][T16159] wg2: entered promiscuous mode [ 1015.219110][T16159] wg2: entered allmulticast mode [ 1018.878881][T16253] mac80211_hwsim hwsim58 wlan1: entered allmulticast mode [ 1019.056592][T16266] mac80211_hwsim hwsim61 wlan1: entered promiscuous mode [ 1019.081560][T16266] mac80211_hwsim hwsim61 wlan1: entered allmulticast mode [ 1019.286429][T16275] wg2: entered promiscuous mode [ 1019.304676][T16275] wg2: entered allmulticast mode [ 1021.623480][T16346] å1ÿ: renamed from bond_slave_0 (while UP) [ 1021.741676][T16352] sit0: entered promiscuous mode [ 1021.758259][T16352] sit0: entered allmulticast mode [ 1026.921763][T16445] syzkaller0: entered promiscuous mode [ 1026.961529][T16445] syzkaller0: entered allmulticast mode [ 1029.851371][ T5087] Bluetooth: hci1: unexpected event 0x18 length: 15 < 23 [ 1034.404781][T16533] can: request_module (can-proto-0) failed. [ 1039.192558][T16588] syzkaller0: entered promiscuous mode [ 1039.209877][T16588] syzkaller0: entered allmulticast mode [ 1041.598222][T16599] sit0: entered allmulticast mode [ 1045.990965][ T5087] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1054.012081][T16791] Driver unsupported XDP return value 0 on prog (id 1678) dev N/A, expect packet loss! [ 1054.772231][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.778856][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1056.418243][T16863] mac80211_hwsim hwsim58 wlan1: left allmulticast mode [ 1062.092031][T17009] bridge0: port 1(bridge_slave_0) entered disabled state [ 1063.821405][T17065] pim6reg1: entered promiscuous mode [ 1067.294828][T17154] syzkaller0: entered promiscuous mode [ 1067.313148][T17154] syzkaller0: entered allmulticast mode [ 1072.712767][ T5087] Bluetooth: hci3: unexpected subevent 0x01 length: 150 > 18 [ 1077.714738][T17364] mac80211_hwsim hwsim61 wlan1: left promiscuous mode [ 1077.742258][T17364] mac80211_hwsim hwsim61 wlan1: left allmulticast mode [ 1077.883747][T17375] wg2: entered promiscuous mode [ 1077.926032][T17375] wg2: entered allmulticast mode [ 1077.938080][T17372] mac80211_hwsim hwsim66 wlan1: entered promiscuous mode [ 1077.987001][T17372] mac80211_hwsim hwsim66 wlan1: entered allmulticast mode [ 1078.072532][T17381] å1ÿ: renamed from bond_slave_0 (while UP) [ 1078.178986][T17384] sit0: entered promiscuous mode [ 1078.195648][T17384] sit0: entered allmulticast mode [ 1079.408615][T17388] syzkaller0: entered promiscuous mode [ 1079.416082][T17388] syzkaller0: entered allmulticast mode [ 1082.208528][T17432] wg2: left promiscuous mode [ 1082.213942][T17432] wg2: left allmulticast mode [ 1082.399921][T17438] wg2: entered promiscuous mode [ 1082.406750][T17438] wg2: entered allmulticast mode [ 1089.872821][T17550] syzkaller0: entered promiscuous mode [ 1089.902709][T17550] syzkaller0: entered allmulticast mode [ 1090.800283][T17572] syzkaller0: entered promiscuous mode [ 1090.866493][T17572] syzkaller0: entered allmulticast mode [ 1092.297342][T17594] syzkaller0: entered promiscuous mode [ 1092.302900][T17594] syzkaller0: entered allmulticast mode [ 1095.831693][T17651] mac80211_hwsim hwsim68 wlan1: entered promiscuous mode [ 1095.863229][T17651] mac80211_hwsim hwsim68 wlan1: entered allmulticast mode [ 1095.938188][T17658] mac80211_hwsim hwsim68 wlan1: left promiscuous mode [ 1095.945051][T17658] mac80211_hwsim hwsim68 wlan1: left allmulticast mode [ 1096.718965][T17671] sit0: entered promiscuous mode [ 1097.341407][T17679] syzkaller0: entered promiscuous mode [ 1097.348529][T17679] syzkaller0: entered allmulticast mode [ 1101.769581][T17726] mac80211_hwsim hwsim58 wlan1: entered promiscuous mode [ 1101.824151][T17726] mac80211_hwsim hwsim58 wlan1: entered allmulticast mode [ 1106.635328][T17784] mac80211_hwsim hwsim61 wlan1: (WE) : Wireless Event (cmd=0x8B1A) too big (33) [ 1107.196130][ T5087] Bluetooth: hci3: unexpected subevent 0x0c length: 150 > 5 [ 1107.312321][T17797] mac80211_hwsim hwsim66 wlan1: left promiscuous mode [ 1111.593647][ T5087] Bluetooth: hci0: unexpected subevent 0x06 length: 150 > 10 [ 1111.950438][T17874] syzkaller0: entered promiscuous mode [ 1112.020925][ T5087] Bluetooth: hci0: unexpected event 0x1c length: 15 > 5 [ 1113.635758][ T5087] Bluetooth: hci0: command 0x0406 tx timeout [ 1116.128182][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1116.134785][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1119.275565][T17953] mac80211_hwsim hwsim58 wlan1: left promiscuous mode [ 1119.282460][T17953] mac80211_hwsim hwsim58 wlan1: left allmulticast mode [ 1124.128474][T18012] syzkaller0: entered promiscuous mode [ 1126.593564][T18015] syzkaller0: entered promiscuous mode [ 1126.600661][T18015] syzkaller0: entered allmulticast mode [ 1127.394542][T18053] syzkaller0: entered promiscuous mode [ 1127.474322][T18053] syzkaller0: entered allmulticast mode [ 1131.567528][T18098] syzkaller0: entered promiscuous mode [ 1131.573088][T18098] syzkaller0: entered allmulticast mode [ 1132.517179][T18115] syzkaller0: entered promiscuous mode [ 1132.535868][T18115] syzkaller0: entered allmulticast mode [ 1132.561766][T18111] lo: entered allmulticast mode [ 1132.780848][T18118] lo: entered promiscuous mode [ 1132.815652][T18118] lo: left allmulticast mode [ 1136.918986][T18162] syzkaller0: entered promiscuous mode [ 1136.924545][T18162] syzkaller0: entered allmulticast mode [ 1139.682147][T18193] syzkaller0: entered promiscuous mode [ 1139.688203][T18193] syzkaller0: entered allmulticast mode [ 1139.698261][T18192] lo: entered allmulticast mode [ 1139.717380][T18197] lo: entered promiscuous mode [ 1139.725567][T18197] lo: left allmulticast mode [ 1143.189771][T18204] lo: left promiscuous mode [ 1143.194370][T18204] lo: entered allmulticast mode [ 1143.211021][T18207] lo: entered promiscuous mode [ 1143.216822][T18207] lo: left allmulticast mode [ 1143.376219][T18217] syzkaller0: entered promiscuous mode [ 1143.384393][T18217] syzkaller0: entered allmulticast mode [ 1145.933642][T18227] sit0: left promiscuous mode [ 1145.975840][T18233] sit0: entered promiscuous mode [ 1146.214830][T18251] syzkaller0: entered promiscuous mode [ 1146.221334][T18251] syzkaller0: entered allmulticast mode [ 1150.985371][T18288] syzkaller0: entered promiscuous mode [ 1150.993529][T18288] syzkaller0: entered allmulticast mode [ 1152.653756][T18319] syzkaller0: entered promiscuous mode [ 1152.702736][T18319] syzkaller0: entered allmulticast mode [ 1156.837380][T18378] syzkaller0: entered promiscuous mode [ 1156.852791][T18378] syzkaller0: entered allmulticast mode [ 1159.461481][T18401] veth1_to_bond: entered promiscuous mode [ 1159.482341][T18401] veth1_to_bond: entered allmulticast mode [ 1159.953439][T18420] mac80211_hwsim hwsim66 wlan1: left allmulticast mode [ 1162.120825][T18443] veth1_to_bond: entered promiscuous mode [ 1162.175745][T18443] veth1_to_bond: entered allmulticast mode [ 1163.654435][T18464] syzkaller0: entered promiscuous mode [ 1163.670451][T18464] syzkaller0: entered allmulticast mode [ 1170.129488][T18589] syzkaller0: entered promiscuous mode [ 1170.187281][T18589] syzkaller0: entered allmulticast mode [ 1175.025793][T18645] veth1_to_bond: left promiscuous mode [ 1175.031395][T18645] veth1_to_bond: left allmulticast mode [ 1175.908232][T18672] syzkaller0: entered promiscuous mode [ 1175.926006][T18672] syzkaller0: entered allmulticast mode [ 1177.562905][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1177.577412][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1178.276594][T18748] syzkaller0: entered promiscuous mode [ 1178.303239][T18748] syzkaller0: entered allmulticast mode [ 1178.455517][T18757] syz.3.3203 (18757) used obsolete PPPIOCDETACH ioctl [ 1179.750302][T18790] syzkaller0: entered promiscuous mode [ 1179.775608][T18790] syzkaller0: entered allmulticast mode [ 1184.889493][T18867] syzkaller0: entered promiscuous mode [ 1184.896446][T18867] syzkaller0: entered allmulticast mode [ 1187.759214][T18865] syzkaller0: entered promiscuous mode [ 1187.764720][T18865] syzkaller0: entered allmulticast mode [ 1200.335620][T19096] bridge_slave_1: left allmulticast mode [ 1200.344900][T19096] bridge_slave_1: left promiscuous mode [ 1200.352485][T19096] bridge0: port 2(bridge_slave_1) entered disabled state [ 1200.370608][T19096] bridge_slave_0: left allmulticast mode [ 1200.399478][T19096] bridge_slave_0: left promiscuous mode [ 1200.405312][T19096] bridge0: port 1(bridge_slave_0) entered disabled state [ 1202.082500][T19149] mac80211_hwsim hwsim61 wlan1: entered allmulticast mode [ 1205.219169][T19225] syzkaller0: entered promiscuous mode [ 1205.245721][T19225] syzkaller0: entered allmulticast mode [ 1222.491588][T19575] mac80211_hwsim hwsim61 wlan1: left allmulticast mode [ 1227.992203][T19686] syzkaller0: entered promiscuous mode [ 1228.065498][T19686] syzkaller0: entered allmulticast mode [ 1239.010052][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1239.016659][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1243.063408][T19941] syzkaller0: entered promiscuous mode [ 1243.079492][T19941] syzkaller0: entered allmulticast mode [ 1244.279283][T19980] syzkaller0: entered promiscuous mode [ 1244.326598][T19980] syzkaller0: entered allmulticast mode [ 1249.197702][T20079] syzkaller0: entered promiscuous mode [ 1249.222244][T20079] syzkaller0: entered allmulticast mode [ 1250.517942][T20118] syzkaller0: entered promiscuous mode [ 1250.545814][T20118] syzkaller0: entered allmulticast mode [ 1251.423727][T20157] tap0: tun_chr_ioctl cmd 2147767511 [ 1251.480044][T20157] tap0: tun_chr_ioctl cmd 1074025675 [ 1251.515632][T20157] tap0: persist enabled [ 1251.520619][T20160] syzkaller0: entered promiscuous mode [ 1251.539297][T20160] syzkaller0: entered allmulticast mode [ 1260.244959][ T5087] Bluetooth: hci0: unexpected event 0x06 length: 15 > 3 [ 1262.889203][ T5087] Bluetooth: hci5: unexpected event 0x06 length: 15 > 3 [ 1271.227987][T20687] mac80211_hwsim hwsim58 wlan1: entered promiscuous mode [ 1271.305745][T20687] mac80211_hwsim hwsim58 wlan1: entered allmulticast mode [ 1276.770833][T20728] mac80211_hwsim hwsim58 wlan1: left promiscuous mode [ 1276.778506][T20728] mac80211_hwsim hwsim58 wlan1: left allmulticast mode [ 1281.696850][T20894] syzkaller0: entered promiscuous mode [ 1281.715930][T20894] syzkaller0: entered allmulticast mode [ 1283.103981][T20943] syzkaller0: entered promiscuous mode [ 1283.138426][T20943] syzkaller0: entered allmulticast mode [ 1284.587441][T20981] syzkaller0: entered promiscuous mode [ 1284.617762][T20981] syzkaller0: entered allmulticast mode [ 1284.982693][T20987] ªªªªª»: renamed from bridge_slave_0 [ 1288.457269][T21032] sit0: left promiscuous mode [ 1292.722333][T21182] sit0: left promiscuous mode [ 1297.125730][ T5087] Bluetooth: hci5: unexpected event 0x05 length: 15 > 4 [ 1297.739179][ T5087] Bluetooth: hci5: unexpected event 0x14 length: 151 > 6 [ 1299.106924][T21333] sit0: entered promiscuous mode [ 1299.422598][T21329] syzkaller0: entered promiscuous mode [ 1299.436560][T21329] syzkaller0: entered allmulticast mode [ 1300.443399][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1300.452934][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1302.831856][T21376] syzkaller0: entered promiscuous mode [ 1302.837786][T21376] syzkaller0: entered allmulticast mode [ 1303.420298][T21404] syzkaller0: entered promiscuous mode [ 1303.427102][T21404] syzkaller0: entered allmulticast mode [ 1308.360116][T21490] syzkaller0: entered promiscuous mode [ 1308.365960][T21490] syzkaller0: entered allmulticast mode [ 1312.919660][ T5087] Bluetooth: hci5: unexpected subevent 0x0a length: 150 > 30 [ 1315.104386][ T51] Bluetooth: hci0: unexpected subevent 0x01 length: 150 > 18 [ 1317.163343][ T5087] Bluetooth: hci0: command 0x0406 tx timeout [ 1319.441660][ T5087] Bluetooth: hci0: unexpected subevent 0x0a length: 150 > 30 [ 1319.461168][ T51] Bluetooth: hci3: unexpected subevent 0x01 length: 150 > 18 [ 1319.976768][T21652] tap1: tun_chr_ioctl cmd 1074025677 [ 1319.985938][T21652] tap1: linktype set to 769 [ 1320.587976][T21639] Bluetooth: hci1: unexpected subevent 0x0a length: 150 > 30 [ 1320.885682][ T5087] Bluetooth: hci1: unexpected subevent 0x01 length: 150 > 18 [ 1321.475685][T21639] Bluetooth: hci3: command 0x0406 tx timeout [ 1322.711262][T21639] Bluetooth: hci3: unexpected subevent 0x0a length: 150 > 30 [ 1322.720567][T21639] sysfs: cannot create duplicate filename '/devices/virtual/bluetooth/hci3/hci3:0' [ 1322.731954][T21639] CPU: 0 PID: 21639 Comm: kworker/u5:2 Not tainted syzkaller #0 [ 1322.739665][T21639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 1322.749753][T21639] Workqueue: hci3 hci_rx_work [ 1322.754733][T21639] Call Trace: [ 1322.758038][T21639] [ 1322.760995][T21639] dump_stack_lvl+0x18c/0x250 [ 1322.765823][T21639] ? show_regs_print_info+0x20/0x20 [ 1322.771055][T21639] ? load_image+0x400/0x400 [ 1322.775798][T21639] sysfs_create_dir_ns+0x26e/0x2a0 [ 1322.781264][T21639] ? sysfs_warn_dup+0xa0/0xa0 [ 1322.786045][T21639] ? do_raw_spin_unlock+0x121/0x230 [ 1322.791509][T21639] kobject_add_internal+0x61c/0xcc0 [ 1322.796964][T21639] kobject_add+0x164/0x240 [ 1322.801428][T21639] ? __rwlock_init+0x150/0x150 [ 1322.806409][T21639] ? kobject_init+0x1e0/0x1e0 [ 1322.811110][T21639] ? _raw_spin_unlock+0x28/0x40 [ 1322.816166][T21639] ? get_device_parent+0x366/0x390 [ 1322.821517][T21639] device_add+0x408/0xc20 [ 1322.825894][T21639] hci_conn_add_sysfs+0xd5/0x1e0 [ 1322.831003][T21639] le_conn_complete_evt+0xf5d/0x1540 [ 1322.836349][T21639] ? hci_le_big_info_adv_report_evt+0x910/0x910 [ 1322.842698][T21639] ? bt_info+0x180/0x180 [ 1322.847208][T21639] ? __mutex_unlock_slowpath+0x1b4/0x6c0 [ 1322.853059][T21639] ? skb_pull_data+0xfb/0x200 [ 1322.857821][T21639] hci_le_enh_conn_complete_evt+0x189/0x460 [ 1322.863834][T21639] ? hci_le_remote_conn_param_req_evt+0xd10/0xd10 [ 1322.870367][T21639] ? hci_remote_host_features_evt+0x150/0x150 [ 1322.876645][T21639] hci_event_packet+0x7ba/0x1270 [ 1322.881783][T21639] ? bis_list+0x290/0x290 [ 1322.886253][T21639] ? lockdep_hardirqs_on+0x98/0x150 [ 1322.891587][T21639] ? hci_send_to_monitor+0xd7/0x4f0 [ 1322.896963][T21639] hci_rx_work+0x43a/0xd60 [ 1322.901577][T21639] ? process_scheduled_works+0x96f/0x15d0 [ 1322.907486][T21639] process_scheduled_works+0xa5d/0x15d0 [ 1322.913122][T21639] ? assign_work+0x430/0x430 [ 1322.917783][T21639] ? assign_work+0x3d0/0x430 [ 1322.922480][T21639] worker_thread+0xa55/0xfc0 [ 1322.927304][T21639] ? _raw_spin_unlock_irqrestore+0xc5/0x120 [ 1322.933415][T21639] ? _raw_spin_unlock+0x40/0x40 [ 1322.938307][T21639] ? _raw_spin_unlock_irqrestore+0x86/0x120 [ 1322.944459][T21639] kthread+0x2fa/0x390 [ 1322.948660][T21639] ? pr_cont_work+0x560/0x560 [ 1322.953489][T21639] ? kthread_blkcg+0xd0/0xd0 [ 1322.958231][T21639] ret_from_fork+0x48/0x80 [ 1322.962718][T21639] ? kthread_blkcg+0xd0/0xd0 [ 1322.967358][T21639] ret_from_fork_asm+0x11/0x20 [ 1322.972441][T21639] [ 1322.976498][ T5087] Bluetooth: hci1: command 0x0406 tx timeout [ 1322.982733][T21639] kobject: kobject_add_internal failed for hci3:0 with -EEXIST, don't try to register things with the same name in the same directory. [ 1322.997250][T21639] Bluetooth: hci3: failed to register connection device [ 1323.023666][T21732] syzkaller0: entered promiscuous mode [ 1323.035659][T21732] syzkaller0: entered allmulticast mode [ 1323.379582][T21639] Bluetooth: hci1: Dropping invalid advertising data [ 1323.389245][T21639] Bluetooth: hci1: Malformed LE Event: 0x02 [ 1326.004067][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1326.539779][T21839] syzkaller0: entered promiscuous mode [ 1326.575723][T21839] syzkaller0: entered allmulticast mode [ 1328.191765][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1329.011523][T21894] syzkaller0: entered promiscuous mode [ 1329.023662][T21894] syzkaller0: entered allmulticast mode [ 1330.206770][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1336.736874][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1337.760432][T21639] Bluetooth: hci1: Malformed Event: 0x13 [ 1338.588748][T22011] pimreg: tun_chr_ioctl cmd 1074025677 [ 1338.603782][T22011] pimreg: linktype set to 769 [ 1338.804839][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1339.653830][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1340.325258][T22069] syzkaller0: entered promiscuous mode [ 1340.332063][T22069] syzkaller0: entered allmulticast mode [ 1340.758311][T21639] Bluetooth: hci1: Malformed Event: 0x13 [ 1341.486583][T22099] syzkaller0: entered promiscuous mode [ 1341.499253][T22099] syzkaller0: entered allmulticast mode [ 1341.842500][T21639] Bluetooth: hci1: Malformed Event: 0x13 [ 1351.357382][T22413] syzkaller0: entered promiscuous mode [ 1351.363470][T22413] syzkaller0: entered allmulticast mode [ 1352.388217][T22453] syzkaller0: entered promiscuous mode [ 1352.394058][T22453] syzkaller0: entered allmulticast mode [ 1353.351671][T22489] syzkaller0: entered promiscuous mode [ 1353.375505][T22489] syzkaller0: entered allmulticast mode [ 1354.603980][T22539] syzkaller0: entered promiscuous mode [ 1354.631271][T22539] syzkaller0: entered allmulticast mode [ 1356.556835][T22633] netlink: 60 bytes leftover after parsing attributes in process `syz.3.4223'. [ 1359.594057][T22633] netlink: 60 bytes leftover after parsing attributes in process `syz.3.4223'. [ 1359.604290][T22680] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1359.615546][T22680] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1359.645822][T22680] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1359.675577][T22680] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1360.726755][T22710] syzkaller0: entered promiscuous mode [ 1360.775481][T22710] syzkaller0: entered allmulticast mode [ 1360.990408][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1361.884287][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.898583][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1362.021466][T22756] syz.4.4268 uses obsolete (PF_INET,SOCK_PACKET) [ 1362.068285][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1365.145665][T22758] sit0: entered promiscuous mode [ 1365.158364][T22758] sit0: left allmulticast mode [ 1365.673574][T21639] Bluetooth: hci0: unexpected event 0x12 length: 151 > 8 [ 1366.096789][T22807] syzkaller0: entered promiscuous mode [ 1366.130521][T22807] syzkaller0: entered allmulticast mode [ 1366.825178][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1370.439852][T21639] Bluetooth: hci0: unexpected event 0x12 length: 151 > 8 [ 1370.876072][T22889] syzkaller0: entered promiscuous mode [ 1370.914472][T22889] syzkaller0: entered allmulticast mode [ 1371.740024][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1374.246299][T21639] Bluetooth: hci1: unexpected event 0x12 length: 151 > 8 [ 1379.553099][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1381.854266][T23017] syzkaller0: entered promiscuous mode [ 1381.860266][T23017] syzkaller0: entered allmulticast mode [ 1385.185257][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1385.618790][T23059] syzkaller0: entered promiscuous mode [ 1385.624316][T23059] syzkaller0: entered allmulticast mode [ 1389.273783][T21639] Bluetooth: hci1: Malformed Event: 0x13 [ 1391.859005][T23094] syzkaller0: entered promiscuous mode [ 1391.864871][T23094] syzkaller0: entered allmulticast mode [ 1394.306139][T23118] macsec0: entered promiscuous mode [ 1394.311623][T23118] macsec0: entered allmulticast mode [ 1394.317856][T23118] veth1_macvtap: entered allmulticast mode [ 1394.817021][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1396.501109][T23176] macsec0: entered promiscuous mode [ 1396.581840][T23176] macsec0: entered allmulticast mode [ 1396.612340][T23176] veth1_macvtap: entered allmulticast mode [ 1396.993652][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1400.989332][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1404.643958][T23271] syzkaller0: entered promiscuous mode [ 1404.716534][T23271] syzkaller0: entered allmulticast mode [ 1405.451099][T21639] Bluetooth: hci1: Malformed Event: 0x13 [ 1407.863856][T23298] syzkaller0: entered promiscuous mode [ 1407.869787][T23298] syzkaller0: entered allmulticast mode [ 1415.166321][T21639] Bluetooth: hci5: Malformed Event: 0x13 [ 1415.556491][T23350] syzkaller0: entered promiscuous mode [ 1415.562130][T23350] syzkaller0: entered allmulticast mode [ 1417.744586][T23373] syzkaller0: entered promiscuous mode [ 1417.797980][T23373] syzkaller0: entered allmulticast mode [ 1419.243365][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1423.322295][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.329191][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1424.934765][T21639] Bluetooth: hci0: unexpected event 0x12 length: 151 > 8 [ 1428.561113][T21639] Bluetooth: hci0: unexpected event 0x12 length: 151 > 8 [ 1429.693479][T23488] syzkaller0: entered promiscuous mode [ 1429.790772][T23488] syzkaller0: entered allmulticast mode [ 1430.963997][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1437.106178][T23534] syzkaller0: entered promiscuous mode [ 1437.153197][T23534] syzkaller0: entered allmulticast mode [ 1445.279469][T23627] veth1_to_bond: left promiscuous mode [ 1448.896532][T23659] syzkaller0: entered promiscuous mode [ 1448.902095][T23659] syzkaller0: entered allmulticast mode [ 1449.590223][ T5087] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1449.599626][ T5087] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1449.631516][ T5087] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1449.664026][ T5087] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1449.675428][ T5087] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1449.682993][ T5087] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1451.670646][T23679] veth1_to_bond: entered allmulticast mode [ 1451.802428][ T5087] Bluetooth: hci2: command tx timeout [ 1452.033630][T23689] sit0: left promiscuous mode [ 1452.055614][T23689] sit0: entered allmulticast mode [ 1452.154434][T23689] sit0: entered promiscuous mode [ 1453.892714][ T5087] Bluetooth: hci2: command tx timeout [ 1454.246129][T23683] chnl_net:caif_netlink_parms(): no params data found [ 1454.347856][T23731] syzkaller0: entered promiscuous mode [ 1454.357555][T23731] syzkaller0: entered allmulticast mode [ 1454.403266][T13083] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1454.478352][T23733] veth1_to_bond: entered allmulticast mode [ 1454.662467][T23737] syzkaller0: entered promiscuous mode [ 1454.675480][T23737] syzkaller0: entered allmulticast mode [ 1454.770055][T23753] syzkaller0: entered promiscuous mode [ 1454.782720][T23753] syzkaller0: entered allmulticast mode [ 1454.859000][T13083] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1455.027669][T13083] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1455.955706][ T5087] Bluetooth: hci2: command tx timeout [ 1458.046082][ T5087] Bluetooth: hci2: command tx timeout [ 1459.626152][T13083] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1462.461792][T23767] bridge0: port 2(bridge_slave_1) entered disabled state [ 1462.469527][T23767] bridge0: port 1(bridge_slave_0) entered disabled state [ 1462.478980][T23767] bridge0: entered allmulticast mode [ 1462.502086][T23768] bridge_slave_1: left allmulticast mode [ 1462.513328][T23768] bridge_slave_1: left promiscuous mode [ 1462.519668][T23768] bridge0: port 2(bridge_slave_1) entered disabled state [ 1462.551504][T23768] bridge_slave_0: left allmulticast mode [ 1462.569671][T23768] bridge_slave_0: left promiscuous mode [ 1462.583601][T23768] bridge0: port 1(bridge_slave_0) entered disabled state [ 1462.700698][T23774] veth0_vlan: entered allmulticast mode [ 1462.733534][T23775] ªªªªªª: renamed from vlan0 [ 1462.747496][T23683] bridge0: port 1(bridge_slave_0) entered blocking state [ 1462.775577][T23683] bridge0: port 1(bridge_slave_0) entered disabled state [ 1462.801172][T23683] bridge_slave_0: entered allmulticast mode [ 1462.897013][T23683] bridge_slave_0: entered promiscuous mode [ 1462.914861][T23683] bridge0: port 2(bridge_slave_1) entered blocking state [ 1462.928955][T23683] bridge0: port 2(bridge_slave_1) entered disabled state [ 1462.945201][T23683] bridge_slave_1: entered allmulticast mode [ 1462.965602][T23683] bridge_slave_1: entered promiscuous mode [ 1463.024118][T23683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1463.103791][T23787] syzkaller0: entered promiscuous mode [ 1463.109781][T23787] syzkaller0: entered allmulticast mode [ 1463.129951][T23683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1463.361891][T23683] team0: Port device team_slave_0 added [ 1463.394492][T23683] team0: Port device team_slave_1 added [ 1463.729685][T23800] syzkaller0: entered promiscuous mode [ 1463.735998][T23800] syzkaller0: entered allmulticast mode [ 1466.080012][T23683] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1466.089424][T23683] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1466.117246][T23683] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1466.234311][T23683] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1466.243689][T23683] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1466.269869][T23683] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1468.558893][T23683] hsr_slave_0: entered promiscuous mode [ 1468.570442][T23683] hsr_slave_1: entered promiscuous mode [ 1468.581833][T23683] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1468.593429][T23683] Cannot create hsr debugfs directory [ 1470.383599][T23850] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.391299][T23850] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.418838][T23850] bridge0: entered allmulticast mode [ 1470.461539][T23854] bridge_slave_1: left allmulticast mode [ 1470.480030][T23854] bridge_slave_1: left promiscuous mode [ 1470.494227][T23854] bridge0: port 2(bridge_slave_1) entered disabled state [ 1470.524489][T23854] bridge_slave_0: left allmulticast mode [ 1470.534357][T23854] bridge_slave_0: left promiscuous mode [ 1470.541471][T23854] bridge0: port 1(bridge_slave_0) entered disabled state [ 1470.816360][T13083] hsr_slave_0: left promiscuous mode [ 1470.832158][T13083] hsr_slave_1: left promiscuous mode [ 1470.846684][T13083] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1470.854350][T13083] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1470.888790][T13083] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1470.921253][T13083] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1470.999752][T13083] veth1_macvtap: left allmulticast mode [ 1471.017848][T13083] veth1_macvtap: left promiscuous mode [ 1471.035554][T13083] veth0_macvtap: left promiscuous mode [ 1471.050699][T13083] veth1_vlan: left promiscuous mode [ 1471.070695][T13083] veth0_vlan: left promiscuous mode [ 1472.076723][T13083] team0 (unregistering): Port device team_slave_1 removed [ 1472.135104][T13083] team0 (unregistering): Port device team_slave_0 removed [ 1472.189180][T13083] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1472.241282][T13083] bond0 (unregistering): (slave cå1ÿ): Releasing backup interface [ 1472.639489][T13083] bond0 (unregistering): Released all slaves [ 1472.771551][T23869] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.785127][T23869] bridge0: entered allmulticast mode [ 1472.800839][T23878] bridge_slave_1: left allmulticast mode [ 1472.809320][T23878] bridge_slave_1: left promiscuous mode [ 1472.816370][T23878] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.828856][T23878] ªªªªª»: left allmulticast mode [ 1472.835136][T23878] ªªªªª»: left promiscuous mode [ 1472.840816][T23878] bridge0: port 1(ªªªªª») entered disabled state [ 1472.973971][T23870] syzkaller0: entered promiscuous mode [ 1472.979780][T23870] syzkaller0: entered allmulticast mode [ 1477.042863][T23683] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1477.082626][T23683] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1477.294350][T23683] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1477.468145][T23683] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1477.747386][T23946] syzkaller0: entered promiscuous mode [ 1477.753079][T23946] syzkaller0: entered allmulticast mode [ 1480.563347][T23965] syzkaller0: entered promiscuous mode [ 1480.569125][T23965] syzkaller0: entered allmulticast mode [ 1482.943070][T23683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1483.015030][T23683] 8021q: adding VLAN 0 to HW filter on device team0 [ 1483.120796][T13082] bridge0: port 1(bridge_slave_0) entered blocking state [ 1483.128207][T13082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1483.196726][T13082] bridge0: port 2(bridge_slave_1) entered blocking state [ 1483.204011][T13082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1483.422694][ T5087] Bluetooth: hci5: Malformed Event: 0x13 [ 1484.472364][T23683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1484.560154][T23683] veth0_vlan: entered promiscuous mode [ 1484.583895][T23683] veth1_vlan: entered promiscuous mode [ 1484.648656][T23683] veth0_macvtap: entered promiscuous mode [ 1484.667071][T23683] veth1_macvtap: entered promiscuous mode [ 1484.689939][T23683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1484.701503][T23683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1484.718710][T23683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1484.730485][T23683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1484.743187][T23683] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1484.765910][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.772648][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1484.799251][T23683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1484.810014][T23683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1484.822967][T23683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1484.835060][T23683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1484.847501][T23683] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1484.863270][T23683] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1484.872335][T23683] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1484.882328][T23683] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1484.892080][T23683] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1485.020868][T13083] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1485.041283][T13083] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1485.074655][T13083] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1485.095666][T13083] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1485.832883][T24059] bridge0: port 2(bridge_slave_1) entered disabled state [ 1485.840788][T24059] bridge0: port 1(bridge_slave_0) entered disabled state [ 1485.908334][T24059] bridge0: entered allmulticast mode [ 1487.159940][T21639] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1487.192069][T21639] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1487.202716][T21639] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1487.211290][T21639] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1487.255580][T21639] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1487.266681][T21639] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1487.760046][T13083] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1487.949660][T13083] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1487.961962][ T5087] Bluetooth: hci0: Malformed Event: 0x13 [ 1488.249981][T13083] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1488.498315][T13083] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1489.094153][T24074] chnl_net:caif_netlink_parms(): no params data found [ 1489.330372][ T5087] Bluetooth: hci0: Malformed Event: 0x13 [ 1489.395898][ T5087] Bluetooth: hci3: command tx timeout [ 1489.599354][T24124] syzkaller0: entered promiscuous mode [ 1489.627475][T24124] syzkaller0: entered allmulticast mode [ 1491.475415][ T5087] Bluetooth: hci3: command tx timeout [ 1491.657305][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1493.555658][ T5087] Bluetooth: hci3: command tx timeout [ 1495.275577][T24074] bridge0: port 1(bridge_slave_0) entered blocking state [ 1495.299707][T24074] bridge0: port 1(bridge_slave_0) entered disabled state [ 1495.314643][T24074] bridge_slave_0: entered allmulticast mode [ 1495.323030][T24074] bridge_slave_0: entered promiscuous mode [ 1495.339733][T24074] bridge0: port 2(bridge_slave_1) entered blocking state [ 1495.352083][T24074] bridge0: port 2(bridge_slave_1) entered disabled state [ 1495.360027][T24074] bridge_slave_1: entered allmulticast mode [ 1495.379518][T24074] bridge_slave_1: entered promiscuous mode [ 1495.637406][ T5087] Bluetooth: hci3: command tx timeout [ 1495.693810][T24074] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1495.948020][T24074] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1496.472964][T24074] team0: Port device team_slave_0 added [ 1496.499514][T24074] team0: Port device team_slave_1 added [ 1496.593979][T24074] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1496.601350][T24074] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1496.628305][T24074] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1496.663951][T24074] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1496.671247][T24074] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1496.701738][T24074] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1496.794329][T24074] hsr_slave_0: entered promiscuous mode [ 1496.801486][T24074] hsr_slave_1: entered promiscuous mode [ 1496.810505][T24074] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1496.823387][T24074] Cannot create hsr debugfs directory [ 1496.994943][T13083] hsr_slave_0: left promiscuous mode [ 1497.002619][T13083] hsr_slave_1: left promiscuous mode [ 1497.025086][T13083] veth1_macvtap: left promiscuous mode [ 1497.031001][T13083] veth0_macvtap: left promiscuous mode [ 1497.037322][T13083] veth1_vlan: left promiscuous mode [ 1497.820399][T13083] team0 (unregistering): Port device team_slave_1 removed [ 1497.872905][T13083] team0 (unregistering): Port device team_slave_0 removed [ 1497.931002][T13083] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1497.984951][T13083] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1498.370890][T13083] bond0 (unregistering): Released all slaves [ 1499.603117][T24074] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1499.633753][T24074] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1499.670493][T24074] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1499.683014][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1499.697433][T24074] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1500.615552][T24074] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1500.653968][T24074] 8021q: adding VLAN 0 to HW filter on device team0 [ 1500.674222][T13083] bridge0: port 1(bridge_slave_0) entered blocking state [ 1500.681443][T13083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1500.704512][T13083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1500.711834][T13083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1502.761635][ T5087] Bluetooth: hci0: Malformed Event: 0x13 [ 1504.995159][T24074] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1505.152769][T24074] veth0_vlan: entered promiscuous mode [ 1505.194093][T24074] veth1_vlan: entered promiscuous mode [ 1505.475348][T24074] veth0_macvtap: entered promiscuous mode [ 1505.531530][T24074] veth1_macvtap: entered promiscuous mode [ 1505.808217][T24074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1505.861882][T24074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1505.904552][T24074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1505.960768][T24074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1505.983176][T24074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1506.017262][T24074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1506.045153][T24074] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1506.056112][ T5087] Bluetooth: hci0: Malformed Event: 0x13 [ 1506.138910][T24074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1506.161198][T24074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1506.174538][T24074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1506.191152][T24074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1506.215418][T24074] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1506.226264][T24074] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1506.243073][T24074] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1506.275213][T24074] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1506.315119][T24074] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1506.335820][T24074] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1506.344682][T24074] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1506.438835][T24303] pim6reg1: entered promiscuous mode [ 1506.448280][T24303] pim6reg1: entered allmulticast mode [ 1506.778632][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1506.813291][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1506.892769][T12846] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1506.920554][T12846] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1507.529512][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1508.375052][T21639] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 1508.389823][T21639] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 1508.405515][T21639] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 1508.443927][T21639] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 1508.465834][T21639] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 1508.474795][T21639] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 1508.955629][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1509.099088][T24348] chnl_net:caif_netlink_parms(): no params data found [ 1509.626099][T13083] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1509.778978][T24348] bridge0: port 1(bridge_slave_0) entered blocking state [ 1509.802865][T24348] bridge0: port 1(bridge_slave_0) entered disabled state [ 1509.827571][T24348] bridge_slave_0: entered allmulticast mode [ 1509.838490][T24348] bridge_slave_0: entered promiscuous mode [ 1509.979246][T13083] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1509.993395][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1510.053631][T24348] bridge0: port 2(bridge_slave_1) entered blocking state [ 1510.065516][T24348] bridge0: port 2(bridge_slave_1) entered disabled state [ 1510.073166][T24348] bridge_slave_1: entered allmulticast mode [ 1510.133267][T24348] bridge_slave_1: entered promiscuous mode [ 1510.407105][T13083] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1510.577572][T13083] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1510.630624][T24348] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1510.674248][T24348] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1510.849897][T24348] team0: Port device team_slave_0 added [ 1510.907316][T24348] team0: Port device team_slave_1 added [ 1511.017662][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1511.027659][T24348] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1511.055532][T24348] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1511.155966][ T5087] Bluetooth: hci4: command tx timeout [ 1511.161729][T24348] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1511.269370][T24348] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1511.316377][T24348] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1511.396689][T24348] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1511.801748][T24348] hsr_slave_0: entered promiscuous mode [ 1511.822991][T24348] hsr_slave_1: entered promiscuous mode [ 1511.833015][T24348] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1511.851116][T24348] Cannot create hsr debugfs directory [ 1512.061871][T24455] syzkaller0: entered promiscuous mode [ 1512.068336][T24455] syzkaller0: entered allmulticast mode [ 1512.110201][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1512.879051][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1513.235742][ T5087] Bluetooth: hci4: command tx timeout [ 1513.922675][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1515.331605][ T5087] Bluetooth: hci4: command tx timeout [ 1516.476140][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1517.395523][ T5087] Bluetooth: hci4: command tx timeout [ 1520.235468][T24583] tun0: tun_chr_ioctl cmd 2148553947 [ 1520.282429][T24577] tun0: tun_chr_ioctl cmd 1074025673 [ 1520.612024][T13083] hsr_slave_0: left promiscuous mode [ 1520.631178][T13083] hsr_slave_1: left promiscuous mode [ 1520.644960][T13083] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1520.664958][T13083] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1520.708413][T13083] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1520.726370][T13083] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1520.829064][T13083] veth1_macvtap: left promiscuous mode [ 1520.835645][T13083] veth0_macvtap: left promiscuous mode [ 1520.841345][T13083] veth1_vlan: left promiscuous mode [ 1520.856233][T13083] veth0_vlan: left promiscuous mode [ 1521.921862][T13083] team0 (unregistering): Port device team_slave_1 removed [ 1521.992694][T13083] team0 (unregistering): Port device team_slave_0 removed [ 1522.061273][T13083] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1522.141037][T13083] bond0 (unregistering): (slave cå1ÿ): Releasing backup interface [ 1522.661350][T13083] bond0 (unregistering): Released all slaves [ 1522.834905][T24599] netlink: 128 bytes leftover after parsing attributes in process `syz.0.4706'. [ 1523.261222][T24348] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1523.395714][T24348] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1523.423615][T24348] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1523.454245][T24348] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1523.701028][T24348] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1523.769606][T24348] 8021q: adding VLAN 0 to HW filter on device team0 [ 1523.826891][T13082] bridge0: port 1(bridge_slave_0) entered blocking state [ 1523.834137][T13082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1523.892534][T13083] bridge0: port 2(bridge_slave_1) entered blocking state [ 1523.899799][T13083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1524.438549][T24650] netlink: 128 bytes leftover after parsing attributes in process `syz.6.4716'. [ 1524.504097][T24348] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1525.133898][T24348] veth0_vlan: entered promiscuous mode [ 1525.200429][T24348] veth1_vlan: entered promiscuous mode [ 1525.284286][T24348] veth0_macvtap: entered promiscuous mode [ 1525.300913][T24348] veth1_macvtap: entered promiscuous mode [ 1525.343291][T24348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1525.368513][T24348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.384105][T24348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1525.411888][T24348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.425490][T24348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1525.445466][T24348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.468998][T24348] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1525.503271][T24348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1525.521439][T24348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.532602][T24348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1525.543642][T24348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.554133][T24348] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1525.571288][T24348] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1525.599199][T24348] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1525.618997][T24348] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1525.640772][T24348] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1525.649836][T24348] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1525.658963][T24348] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1525.770587][ T1086] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1525.785394][ T1086] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1525.838619][ T1086] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1525.848925][ T1086] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1526.203399][T24679] netlink: 128 bytes leftover after parsing attributes in process `syz.4.4725'. [ 1527.047474][T24680] netlink: 16410 bytes leftover after parsing attributes in process `syz.0.4735'. [ 1527.148619][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1528.339336][ T5087] Bluetooth: hci3: Malformed Event: 0x13 [ 1531.387208][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1531.532663][T24744] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1533.206367][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1533.298436][T24783] netlink: 'syz.6.4771': attribute type 29 has an invalid length. [ 1533.328315][T24783] netlink: 'syz.6.4771': attribute type 29 has an invalid length. [ 1533.360911][T24785] netlink: 'syz.6.4771': attribute type 29 has an invalid length. [ 1533.400464][T24787] netlink: 'syz.6.4771': attribute type 29 has an invalid length. [ 1533.986779][T24793] syzkaller0: entered promiscuous mode [ 1533.992513][T24793] syzkaller0: entered allmulticast mode [ 1534.582815][T24800] netlink: 'syz.4.4768': attribute type 1 has an invalid length. [ 1534.593512][T24800] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.4768'. [ 1534.817759][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1537.430423][T24809] netlink: 'syz.6.4773': attribute type 21 has an invalid length. [ 1537.825964][T24839] netlink: 'syz.4.4778': attribute type 1 has an invalid length. [ 1537.844000][T24843] netlink: 'syz.0.4781': attribute type 29 has an invalid length. [ 1537.861107][T24843] netlink: 'syz.0.4781': attribute type 29 has an invalid length. [ 1537.867784][T24847] netlink: 'syz.0.4781': attribute type 29 has an invalid length. [ 1538.479767][T24839] netlink: 193500 bytes leftover after parsing attributes in process `syz.4.4778'. [ 1538.685495][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1538.883031][T24860] mac80211_hwsim hwsim74 wlan1: entered allmulticast mode [ 1539.546686][T24871] syzkaller0: entered promiscuous mode [ 1539.553324][T24871] syzkaller0: entered allmulticast mode [ 1539.587580][T24877] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1539.970887][T24897] validate_nla: 1 callbacks suppressed [ 1539.970908][T24897] netlink: 'syz.0.4793': attribute type 29 has an invalid length. [ 1540.023381][T24891] netlink: 'syz.4.4794': attribute type 29 has an invalid length. [ 1540.082522][ T5087] Bluetooth: hci2: Malformed Event: 0x13 [ 1543.463837][T24897] netlink: 'syz.0.4793': attribute type 29 has an invalid length. [ 1543.472295][T24891] netlink: 'syz.4.4794': attribute type 29 has an invalid length. [ 1543.512687][T24913] netlink: 830 bytes leftover after parsing attributes in process `syz.3.4797'. [ 1545.250098][T21639] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1545.260134][T21639] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1545.274320][T24949] mac80211_hwsim hwsim73 wlan0: entered allmulticast mode [ 1545.300882][T21639] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1545.311413][T21639] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1545.319532][T21639] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1545.336407][T21639] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1545.387921][T24943] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1545.438936][T24950] mac80211_hwsim hwsim73 wlan0: entered promiscuous mode [ 1545.456812][T24956] netlink: 'syz.3.4807': attribute type 4 has an invalid length. [ 1545.729643][T13083] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1545.817855][T24960] netlink: 'syz.3.4810': attribute type 10 has an invalid length. [ 1545.845992][T24960] netlink: 55 bytes leftover after parsing attributes in process `syz.3.4810'. [ 1546.213259][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1546.220034][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1546.762232][T24962] mac80211_hwsim hwsim73 wlan0: left promiscuous mode [ 1546.830909][T13083] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1546.872074][T24960] syz.3.4810 (24960) used greatest stack depth: 19432 bytes left [ 1546.881069][T24969] mac80211_hwsim hwsim73 wlan0: entered promiscuous mode [ 1547.047166][T24964] syzkaller0: entered promiscuous mode [ 1547.052812][T24964] syzkaller0: entered allmulticast mode [ 1547.401613][T21639] Bluetooth: hci0: command tx timeout [ 1549.480105][T21639] Bluetooth: hci0: command tx timeout [ 1550.407403][T13083] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1550.425161][T24979] mac80211_hwsim hwsim74 wlan1: left allmulticast mode [ 1550.577696][T13083] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1550.737360][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1550.951909][T25006] netlink: 132 bytes leftover after parsing attributes in process `syz.0.4822'. [ 1551.565965][T21639] Bluetooth: hci0: command tx timeout [ 1551.701103][T25016] syzkaller0: entered promiscuous mode [ 1551.720127][T25016] syzkaller0: entered allmulticast mode [ 1551.733127][T24955] chnl_net:caif_netlink_parms(): no params data found [ 1551.969175][T25035] netlink: 'syz.3.4827': attribute type 10 has an invalid length. [ 1553.635975][T21639] Bluetooth: hci0: command tx timeout [ 1558.013499][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1558.646189][T25049] mac80211_hwsim hwsim69 wlan0: entered allmulticast mode [ 1558.713318][T25056] mac80211_hwsim hwsim69 wlan0: entered promiscuous mode [ 1558.923605][T24955] bridge0: port 1(bridge_slave_0) entered blocking state [ 1558.931863][T24955] bridge0: port 1(bridge_slave_0) entered disabled state [ 1558.942707][T24955] bridge_slave_0: entered allmulticast mode [ 1558.954945][T24955] bridge_slave_0: entered promiscuous mode [ 1559.008623][T24955] bridge0: port 2(bridge_slave_1) entered blocking state [ 1559.023054][T24955] bridge0: port 2(bridge_slave_1) entered disabled state [ 1559.035174][T24955] bridge_slave_1: entered allmulticast mode [ 1559.052623][T24955] bridge_slave_1: entered promiscuous mode [ 1559.256523][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1559.288293][T24955] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1559.319069][T24955] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1559.620690][T24955] team0: Port device team_slave_0 added [ 1559.650528][T24955] team0: Port device team_slave_1 added [ 1560.122834][T24955] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1560.147358][T24955] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1560.193360][T24955] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1560.216794][T24955] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1560.223889][T24955] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1560.295408][T24955] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1560.338608][T21639] Bluetooth: hci2: unexpected event 0x12 length: 151 > 8 [ 1560.549730][T13083] hsr_slave_0: left promiscuous mode [ 1560.626048][T13083] hsr_slave_1: left promiscuous mode [ 1560.633628][T13083] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1560.685365][T13083] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1560.693668][T13083] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1560.704913][T13083] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1560.773428][T13083] veth1_macvtap: left allmulticast mode [ 1560.773881][T21639] Bluetooth: hci4: unexpected event 0x12 length: 151 > 8 [ 1560.782569][T13083] veth1_macvtap: left promiscuous mode [ 1560.812391][T13083] veth0_macvtap: left promiscuous mode [ 1560.823348][T13083] veth1_vlan: left promiscuous mode [ 1560.843213][T13083] veth0_vlan: left promiscuous mode [ 1561.283490][T25141] netlink: 209844 bytes leftover after parsing attributes in process `syz.4.4857'. [ 1561.879365][T13083] team0 (unregistering): Port device team_slave_1 removed [ 1561.933581][T13083] team0 (unregistering): Port device team_slave_0 removed [ 1561.988911][T13083] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1562.049204][T13083] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1562.471525][T13083] bond0 (unregistering): Released all slaves [ 1562.673429][T24955] hsr_slave_0: entered promiscuous mode [ 1562.704100][T24955] hsr_slave_1: entered promiscuous mode [ 1563.386908][T21639] Bluetooth: hci2: unexpected event 0x12 length: 151 > 8 [ 1563.755775][T21639] Bluetooth: hci4: unexpected event 0x12 length: 151 > 8 [ 1565.464857][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1566.023461][T24955] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1566.157781][T24955] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1566.206251][T24955] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1566.245451][T24955] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1567.072472][T24955] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1567.239426][T24955] 8021q: adding VLAN 0 to HW filter on device team0 [ 1567.481613][T25221] syzkaller0: entered promiscuous mode [ 1567.500920][T25221] syzkaller0: entered allmulticast mode [ 1567.546702][T13082] bridge0: port 1(bridge_slave_0) entered blocking state [ 1567.553956][T13082] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1568.409520][T13082] bridge0: port 2(bridge_slave_1) entered blocking state [ 1568.416777][T13082] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1568.463259][T21639] Bluetooth: hci3: unexpected event 0x12 length: 151 > 8 [ 1571.080447][T25267] netlink: 'syz.0.4888': attribute type 10 has an invalid length. [ 1572.005522][T25290] netlink: 'syz.0.4892': attribute type 2 has an invalid length. [ 1572.033644][T25290] netlink: 'syz.0.4892': attribute type 2 has an invalid length. [ 1572.059080][T25290] netlink: 199676 bytes leftover after parsing attributes in process `syz.0.4892'. [ 1572.082268][ T5087] Bluetooth: hci4: unexpected event 0x12 length: 151 > 8 [ 1572.251809][T24955] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1573.353340][T25302] syzkaller0: entered promiscuous mode [ 1573.396794][T25302] syzkaller0: entered allmulticast mode [ 1573.885877][ T5087] Bluetooth: hci2: command 0x0406 tx timeout [ 1573.900539][T25343] delete_channel: no stack [ 1576.228453][T25350] netlink: 'syz.3.4903': attribute type 21 has an invalid length. [ 1576.238439][T25350] netlink: 'syz.3.4903': attribute type 12 has an invalid length. [ 1576.254488][T25350] netlink: 'syz.3.4903': attribute type 13 has an invalid length. [ 1576.276088][T25350] netlink: 'syz.3.4903': attribute type 14 has an invalid length. [ 1576.284152][T25350] netlink: 'syz.3.4903': attribute type 15 has an invalid length. [ 1576.292941][T25350] netlink: 'syz.3.4903': attribute type 16 has an invalid length. [ 1576.301422][T25350] netlink: 'syz.3.4903': attribute type 19 has an invalid length. [ 1576.310695][T25350] netlink: 'syz.3.4903': attribute type 21 has an invalid length. [ 1576.321461][T25350] netlink: 'syz.3.4903': attribute type 22 has an invalid length. [ 1576.330177][T25350] netlink: 12226 bytes leftover after parsing attributes in process `syz.3.4903'. [ 1576.469604][T24955] veth0_vlan: entered promiscuous mode [ 1576.524739][T24955] veth1_vlan: entered promiscuous mode [ 1576.571352][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1576.728040][T24955] veth0_macvtap: entered promiscuous mode [ 1576.769266][T24955] veth1_macvtap: entered promiscuous mode [ 1576.837281][T24955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1576.866438][T24955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1576.890101][T24955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1576.942334][T24955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1576.984864][T24955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1576.996740][T24955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1577.009489][T24955] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1577.092967][T24955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1577.114110][T24955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1577.134427][T24955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1577.155912][T24955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1577.177655][T24955] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1577.204205][T24955] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1577.233495][T24955] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1577.259416][T24955] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1577.279848][T24955] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1577.302987][T24955] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1577.325392][T24955] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1577.376601][T25372] netlink: 'syz.0.4911': attribute type 10 has an invalid length. [ 1577.386885][T25372] netlink: 156 bytes leftover after parsing attributes in process `syz.0.4911'. [ 1578.172039][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1578.236078][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1578.278226][T13083] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1578.307857][T13083] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1578.816393][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1578.819421][T25387] team0 (unregistering): Port device team_slave_0 removed [ 1578.922142][T25387] team0 (unregistering): Port device team_slave_1 removed [ 1579.180958][T25390] syzkaller0: entered promiscuous mode [ 1579.209721][T25390] syzkaller0: entered allmulticast mode [ 1581.631792][T25419] syzkaller0: entered promiscuous mode [ 1581.638049][T25419] syzkaller0: entered allmulticast mode [ 1584.062385][T25432] validate_nla: 1 callbacks suppressed [ 1584.062413][T25432] netlink: 'syz.3.4921': attribute type 10 has an invalid length. [ 1584.098118][T25432] netlink: 156 bytes leftover after parsing attributes in process `syz.3.4921'. [ 1585.552525][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1586.538485][T25464] syzkaller0: entered promiscuous mode [ 1586.580796][T25464] syzkaller0: entered allmulticast mode [ 1589.602650][T25479] netlink: 'syz.3.4931': attribute type 10 has an invalid length. [ 1589.694704][T25479] team0 (unregistering): Port device team_slave_0 removed [ 1589.719538][T25479] team0 (unregistering): Port device team_slave_1 removed [ 1589.750653][T25452] netlink: 'syz.6.4926': attribute type 21 has an invalid length. [ 1589.758863][T25452] netlink: 156 bytes leftover after parsing attributes in process `syz.6.4926'. [ 1590.121014][T25495] IPv6: pim6reg1: Disabled Multicast RS [ 1590.131833][T25496] netlink: 'syz.6.4932': attribute type 10 has an invalid length. [ 1590.144136][T25496] netlink: 156 bytes leftover after parsing attributes in process `syz.6.4932'. [ 1590.302955][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1590.584750][T25504] syzkaller0: entered promiscuous mode [ 1590.600115][T25504] syzkaller0: entered allmulticast mode [ 1594.355836][T25506] Ÿë: port 1(veth0_to_team) entered blocking state [ 1594.362556][T25506] Ÿë: port 1(veth0_to_team) entered disabled state [ 1594.376813][T25506] veth0_to_team: entered allmulticast mode [ 1594.390335][T25506] veth0_to_team: entered promiscuous mode [ 1594.631863][T25528] netlink: 'syz.3.4947': attribute type 12 has an invalid length. [ 1594.703426][T25528] netlink: 132 bytes leftover after parsing attributes in process `syz.3.4947'. [ 1594.824358][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1595.282471][T25544] IPv6: pim6reg1: Disabled Multicast RS [ 1595.620898][T25549] syzkaller0: entered promiscuous mode [ 1595.676117][T25549] syzkaller0: entered allmulticast mode [ 1595.998995][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1596.002755][T25560] netlink: 'syz.4.4959': attribute type 10 has an invalid length. [ 1596.024291][T25560] netlink: 156 bytes leftover after parsing attributes in process `syz.4.4959'. [ 1601.279409][T25577] IPv6: pim6reg1: Disabled Multicast RS [ 1601.421422][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1601.646295][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1601.917374][T25603] netlink: 'syz.6.4973': attribute type 29 has an invalid length. [ 1601.939577][T25603] netlink: 'syz.6.4973': attribute type 29 has an invalid length. [ 1601.951358][T25608] netlink: 168 bytes leftover after parsing attributes in process `syz.3.4976'. [ 1601.985780][T25611] netlink: 'syz.6.4973': attribute type 29 has an invalid length. [ 1602.344690][T25618] syzkaller0: entered promiscuous mode [ 1602.403948][T25618] syzkaller0: entered allmulticast mode [ 1604.425635][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1607.432546][T25635] IPv6: pim6reg1: Disabled Multicast RS [ 1607.472988][T25620] Ÿë: port 1(veth0_to_team) entered blocking state [ 1607.480590][T25620] Ÿë: port 1(veth0_to_team) entered disabled state [ 1607.495868][T25620] veth0_to_team: entered allmulticast mode [ 1607.503397][T25620] veth0_to_team: entered promiscuous mode [ 1607.617099][T25654] netlink: 168 bytes leftover after parsing attributes in process `syz.6.4986'. [ 1607.645212][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.651685][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1609.726195][ T5087] Bluetooth: hci3: command 0x0406 tx timeout [ 1610.590879][T25660] netlink: 'syz.4.4989': attribute type 10 has an invalid length. [ 1610.798405][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1611.242767][T25683] syzkaller0: entered promiscuous mode [ 1611.251121][T25683] syzkaller0: entered allmulticast mode [ 1617.201576][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1617.808132][T25738] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5014'. [ 1618.416794][T25745] netlink: 'syz.3.5016': attribute type 29 has an invalid length. [ 1618.447448][T25745] netlink: 'syz.3.5016': attribute type 29 has an invalid length. [ 1618.487764][T25746] netlink: 'syz.3.5016': attribute type 29 has an invalid length. [ 1618.736790][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1619.552446][T25782] netlink: 160 bytes leftover after parsing attributes in process `syz.6.5029'. [ 1619.846397][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1622.767371][T25802] syzkaller0: entered promiscuous mode [ 1622.773007][T25802] syzkaller0: entered allmulticast mode [ 1622.914737][T25814] netlink: 'syz.4.5037': attribute type 29 has an invalid length. [ 1623.034515][T25812] netlink: 160 bytes leftover after parsing attributes in process `syz.0.5039'. [ 1623.044858][T25814] netlink: 'syz.4.5037': attribute type 29 has an invalid length. [ 1623.061962][T25817] netlink: 'syz.4.5037': attribute type 29 has an invalid length. [ 1626.051504][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1626.100478][T25839] netlink: 160 bytes leftover after parsing attributes in process `syz.0.5048'. [ 1627.611428][T25857] syzkaller0: entered promiscuous mode [ 1627.635773][T25857] syzkaller0: entered allmulticast mode [ 1631.753716][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1632.543751][T25894] netlink: 128 bytes leftover after parsing attributes in process `syz.6.5067'. [ 1632.642022][T25896] syzkaller0: entered promiscuous mode [ 1632.654864][T25896] syzkaller0: entered allmulticast mode [ 1633.079647][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1635.326314][ T5087] Bluetooth: hci4: command 0x0406 tx timeout [ 1636.249793][T25927] netlink: 128 bytes leftover after parsing attributes in process `syz.0.5077'. [ 1636.500447][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1638.792562][T25962] syzkaller0: entered promiscuous mode [ 1638.800038][T25962] syzkaller0: entered allmulticast mode [ 1640.227726][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1646.784642][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1648.894015][T26009] mac80211_hwsim hwsim71 wlan0: entered promiscuous mode [ 1648.909636][T26009] mac80211_hwsim hwsim71 wlan0: entered allmulticast mode [ 1649.052105][T26009] netlink: 'syz.0.5105': attribute type 9 has an invalid length. [ 1649.065845][T26009] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.5105'. [ 1649.231889][T26021] syzkaller0: entered promiscuous mode [ 1649.237761][T26021] syzkaller0: entered allmulticast mode [ 1649.400050][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1652.229314][T26041] syzkaller0: entered promiscuous mode [ 1652.234871][T26041] syzkaller0: entered allmulticast mode [ 1652.811250][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1653.264925][T26071] netlink: 'syz.4.5124': attribute type 9 has an invalid length. [ 1653.305328][T26071] netlink: 209836 bytes leftover after parsing attributes in process `syz.4.5124'. [ 1655.419892][T26078] syzkaller0: entered promiscuous mode [ 1655.427087][T26078] syzkaller0: entered allmulticast mode [ 1655.445768][T26075] netlink: 'syz.4.5126': attribute type 10 has an invalid length. [ 1655.457072][T26075] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5126'. [ 1655.737918][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1658.180954][T26091] syzkaller0: entered promiscuous mode [ 1658.190414][T26091] syzkaller0: entered allmulticast mode [ 1658.492299][T26116] netlink: 'syz.6.5136': attribute type 9 has an invalid length. [ 1658.506618][T26116] netlink: 209836 bytes leftover after parsing attributes in process `syz.6.5136'. [ 1660.663748][T26105] syzkaller0: entered promiscuous mode [ 1660.669434][T26105] syzkaller0: entered allmulticast mode [ 1660.676684][T26108] mac80211_hwsim hwsim76 wlan0: entered promiscuous mode [ 1660.689124][T26108] mac80211_hwsim hwsim76 wlan0: entered allmulticast mode [ 1663.307356][T26121] netlink: 'syz.4.5139': attribute type 10 has an invalid length. [ 1663.323352][T26121] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5139'. [ 1663.555479][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1663.667770][T26133] syzkaller0: entered promiscuous mode [ 1663.673430][T26133] syzkaller0: entered allmulticast mode [ 1664.725525][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1666.865523][T26149] netlink: 'syz.3.5151': attribute type 10 has an invalid length. [ 1666.873493][T26149] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5151'. [ 1667.019701][T26157] syzkaller0: entered promiscuous mode [ 1667.028258][T26157] syzkaller0: entered allmulticast mode [ 1667.193726][T26177] netlink: 'syz.6.5160': attribute type 29 has an invalid length. [ 1668.237304][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1669.104843][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1669.111428][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1670.906712][T26177] netlink: 'syz.6.5160': attribute type 29 has an invalid length. [ 1670.916987][T26199] netlink: 'syz.3.5167': attribute type 10 has an invalid length. [ 1670.925013][T26199] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5167'. [ 1671.155614][ T5087] Bluetooth: hci0: command 0x0406 tx timeout [ 1671.189619][T26205] syzkaller0: entered promiscuous mode [ 1671.195329][T26205] syzkaller0: entered allmulticast mode [ 1671.467338][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1674.356589][T26227] netlink: 'syz.0.5178': attribute type 10 has an invalid length. [ 1674.364659][T26227] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5178'. [ 1674.440975][T26235] syzkaller0: entered promiscuous mode [ 1674.465728][T26235] syzkaller0: entered allmulticast mode [ 1676.911624][T26249] netlink: 14 bytes leftover after parsing attributes in process `syz.0.5183'. [ 1676.978380][T26249] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1676.998874][T26249] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1677.051798][T26249] bond0 (unregistering): Released all slaves [ 1677.155570][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1677.623208][T26268] netlink: 'syz.6.5191': attribute type 10 has an invalid length. [ 1677.668756][T26268] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5191'. [ 1678.032456][T26277] syzkaller0: entered promiscuous mode [ 1678.043790][T26277] syzkaller0: entered allmulticast mode [ 1678.093241][T26275] syzkaller0: entered promiscuous mode [ 1678.122806][T26275] syzkaller0: entered allmulticast mode [ 1678.386810][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1682.309998][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1684.880683][T26298] netlink: 'syz.0.5203': attribute type 10 has an invalid length. [ 1684.891186][T26298] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5203'. [ 1686.181589][T26339] syzkaller0: entered promiscuous mode [ 1686.193938][T26339] syzkaller0: entered allmulticast mode [ 1688.260486][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1688.311495][T26348] netlink: 129384 bytes leftover after parsing attributes in process `syz.0.5220'. [ 1690.923632][T26354] syzkaller0: entered promiscuous mode [ 1690.935360][T26354] syzkaller0: entered allmulticast mode [ 1693.588752][T26364] netlink: 'syz.0.5224': attribute type 10 has an invalid length. [ 1693.596792][T26364] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5224'. [ 1694.083021][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1697.356767][T26404] netlink: 129384 bytes leftover after parsing attributes in process `syz.4.5233'. [ 1699.431261][T26404] netlink: 'syz.4.5233': attribute type 21 has an invalid length. [ 1699.461969][T26404] netlink: 'syz.4.5233': attribute type 1 has an invalid length. [ 1699.493595][T26404] netlink: 144 bytes leftover after parsing attributes in process `syz.4.5233'. [ 1699.644516][T26412] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1699.668477][T26409] syzkaller0: entered promiscuous mode [ 1699.681589][T26409] syzkaller0: entered allmulticast mode [ 1699.709342][T26412] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5235'. [ 1699.721969][T26412] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5235'. [ 1699.744521][T26412] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5235'. [ 1699.850943][T26416] syzkaller0: entered promiscuous mode [ 1699.863371][T26416] syzkaller0: entered allmulticast mode [ 1699.871891][T26417] netlink: 'syz.4.5237': attribute type 10 has an invalid length. [ 1699.881676][T26417] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5237'. [ 1702.971650][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1705.923270][T26460] netlink: 'syz.6.5248': attribute type 10 has an invalid length. [ 1705.936835][T26460] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5248'. [ 1706.004101][T26455] netlink: 129384 bytes leftover after parsing attributes in process `syz.3.5245'. [ 1706.230708][T26461] syzkaller0: entered promiscuous mode [ 1706.263198][T26461] syzkaller0: entered allmulticast mode [ 1706.284709][T26468] netlink: 'syz.3.5245': attribute type 21 has an invalid length. [ 1706.332088][T26468] netlink: 'syz.3.5245': attribute type 1 has an invalid length. [ 1706.370040][T26468] netlink: 144 bytes leftover after parsing attributes in process `syz.3.5245'. [ 1706.784479][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1712.132128][T26498] syzkaller0: entered promiscuous mode [ 1712.138093][T26498] syzkaller0: entered allmulticast mode [ 1712.356241][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1715.858579][T26539] syzkaller0: entered promiscuous mode [ 1715.868570][T26539] syzkaller0: entered allmulticast mode [ 1716.059651][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1721.710958][T26574] syzkaller0: entered promiscuous mode [ 1721.716839][T26574] syzkaller0: entered allmulticast mode [ 1721.903567][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1724.542041][T26581] syzkaller0: entered promiscuous mode [ 1724.548159][T26581] syzkaller0: entered allmulticast mode [ 1727.360783][T26603] syzkaller0: entered promiscuous mode [ 1727.367632][T26603] syzkaller0: entered allmulticast mode [ 1727.522121][T26616] netlink: 'syz.4.5287': attribute type 10 has an invalid length. [ 1727.538700][T26616] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5287'. [ 1728.450265][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1730.524070][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1730.536658][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1731.472561][T26637] syzkaller0: entered promiscuous mode [ 1731.495385][T26637] syzkaller0: entered allmulticast mode [ 1731.696172][T26653] syzkaller0: entered promiscuous mode [ 1731.701915][T26653] syzkaller0: entered allmulticast mode [ 1734.214477][T26661] netlink: 'syz.6.5298': attribute type 10 has an invalid length. [ 1734.222874][T26661] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5298'. [ 1734.495571][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1737.497857][T26693] syzkaller0: entered promiscuous mode [ 1737.504761][T26693] syzkaller0: entered allmulticast mode [ 1737.902380][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1741.731081][T26713] netlink: 9286 bytes leftover after parsing attributes in process `syz.4.5315'. [ 1743.453292][T26701] netlink: 'syz.3.5310': attribute type 10 has an invalid length. [ 1743.461411][T26701] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5310'. [ 1743.471495][T26706] netlink: 'syz.0.5312': attribute type 10 has an invalid length. [ 1743.480283][T26706] netlink: 14548 bytes leftover after parsing attributes in process `syz.0.5312'. [ 1743.704712][T26716] syzkaller0: entered promiscuous mode [ 1743.710778][T26716] syzkaller0: entered allmulticast mode [ 1744.330620][T26749] netlink: 'syz.0.5324': attribute type 9 has an invalid length. [ 1744.341088][T26749] netlink: 209836 bytes leftover after parsing attributes in process `syz.0.5324'. [ 1746.338919][T26738] syzkaller0: entered promiscuous mode [ 1746.344695][T26738] syzkaller0: entered allmulticast mode [ 1746.381894][T26729] syzkaller0: entered promiscuous mode [ 1746.387580][T26729] syzkaller0: entered allmulticast mode [ 1751.921232][T26755] netlink: 'syz.4.5326': attribute type 10 has an invalid length. [ 1751.929908][T26755] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5326'. [ 1752.151596][T26759] syzkaller0: entered promiscuous mode [ 1752.157255][T26759] syzkaller0: entered allmulticast mode [ 1752.463496][T26770] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1755.417817][T26774] syzkaller0: entered promiscuous mode [ 1755.423361][T26774] syzkaller0: entered allmulticast mode [ 1755.562175][T26811] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1757.830219][T26794] syzkaller0: entered promiscuous mode [ 1757.836146][T26794] syzkaller0: entered allmulticast mode [ 1760.144763][T26803] syzkaller0: entered promiscuous mode [ 1760.150556][T26803] syzkaller0: entered allmulticast mode [ 1760.158262][T26811] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5341'. [ 1760.168084][T26811] netlink: 3 bytes leftover after parsing attributes in process `syz.4.5341'. [ 1760.178284][T26811] netlink: 3 bytes leftover after parsing attributes in process `syz.4.5341'. [ 1760.826702][T26831] netlink: 203516 bytes leftover after parsing attributes in process `syz.4.5343'. [ 1760.847707][T26831] netlink: get zone limit has 8 unknown bytes [ 1763.521775][T26848] syzkaller0: entered promiscuous mode [ 1763.531367][T26848] syzkaller0: entered allmulticast mode [ 1763.555356][T26850] netlink: 830 bytes leftover after parsing attributes in process `syz.0.5350'. [ 1763.717140][T26857] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1769.203660][T26857] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5353'. [ 1769.212951][T26857] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5353'. [ 1769.222661][T26857] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5353'. [ 1769.253090][T26880] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1769.287004][T26880] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1769.313871][T26880] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1769.343393][T26880] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1769.356579][T26887] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1769.454562][T26887] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5369'. [ 1769.494163][T26887] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5369'. [ 1769.529951][T26887] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5369'. [ 1769.661579][T26888] syzkaller0: entered promiscuous mode [ 1769.668891][T26888] syzkaller0: entered allmulticast mode [ 1769.750543][T26897] syzkaller0: entered promiscuous mode [ 1769.756284][T26897] syzkaller0: entered allmulticast mode [ 1769.805773][T26899] netlink: 'syz.3.5364': attribute type 10 has an invalid length. [ 1769.814114][T26899] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5364'. [ 1772.899355][T26926] syzkaller0: entered promiscuous mode [ 1772.905005][T26926] syzkaller0: entered allmulticast mode [ 1773.140211][T26941] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1775.321408][T26937] netlink: 'syz.0.5374': attribute type 10 has an invalid length. [ 1775.331080][T26937] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5374'. [ 1775.345435][T26941] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5376'. [ 1775.354534][T26941] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5376'. [ 1775.375680][T26941] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5376'. [ 1776.270459][T26957] netlink: 'syz.3.5381': attribute type 3 has an invalid length. [ 1776.279808][T26957] netlink: 'syz.3.5381': attribute type 16 has an invalid length. [ 1776.290018][T26957] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5381'. [ 1778.510611][T26951] netlink: 'syz.0.5377': attribute type 10 has an invalid length. [ 1778.524333][T26951] batman_adv: batadv0: Adding interface: netdevsim0 [ 1778.545215][T26951] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1778.573479][T26951] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 1778.586881][T26967] netlink: 'syz.6.5385': attribute type 10 has an invalid length. [ 1778.594892][T26967] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5385'. [ 1778.722906][T26974] syzkaller0: entered promiscuous mode [ 1778.735272][T26981] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1778.755226][T26974] syzkaller0: entered allmulticast mode [ 1781.686038][T26981] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5388'. [ 1781.695345][T26981] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5388'. [ 1781.704216][T26981] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5388'. [ 1781.895929][T27004] syzkaller0: entered promiscuous mode [ 1781.901518][T27004] syzkaller0: entered allmulticast mode [ 1784.531034][T27014] mac80211_hwsim hwsim71 wlan0: left promiscuous mode [ 1784.553324][T27021] mac80211_hwsim hwsim71 wlan0: entered promiscuous mode [ 1784.592009][T27039] netlink: 830 bytes leftover after parsing attributes in process `syz.3.5407'. [ 1784.694909][T27042] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1784.710691][T27042] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5408'. [ 1784.723603][T27042] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5408'. [ 1784.735905][T27042] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5408'. [ 1784.882999][T27044] syzkaller0: entered promiscuous mode [ 1784.889114][T27044] syzkaller0: entered allmulticast mode [ 1788.000391][T27085] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1788.030307][T27085] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5423'. [ 1788.047901][T27085] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5423'. [ 1788.061681][T27085] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5423'. [ 1788.200025][T27095] netlink: 'syz.4.5427': attribute type 10 has an invalid length. [ 1788.253300][T27095] bond0: (slave bond_slave_0): Releasing backup interface [ 1788.669554][T27104] syzkaller0: entered promiscuous mode [ 1788.678792][T27104] syzkaller0: entered allmulticast mode [ 1791.632662][T27110] syzkaller0: entered promiscuous mode [ 1791.638651][T27110] syzkaller0: entered allmulticast mode [ 1791.880899][T27125] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1791.969359][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1791.987633][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1796.467847][T27125] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5436'. [ 1796.477326][T27125] netlink: 3 bytes leftover after parsing attributes in process `syz.4.5436'. [ 1796.486814][T27125] netlink: 3 bytes leftover after parsing attributes in process `syz.4.5436'. [ 1796.722076][T27148] netlink: 14560 bytes leftover after parsing attributes in process `syz.4.5442'. [ 1796.779274][T27148] netlink: 'syz.4.5442': attribute type 39 has an invalid length. [ 1799.775722][T27148] hsr_slave_1 (unregistering): left promiscuous mode [ 1800.061647][T27169] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1802.749988][T27169] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5450'. [ 1802.763404][T27169] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5450'. [ 1802.776801][T27169] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5450'. [ 1802.941906][T27176] syzkaller0: entered promiscuous mode [ 1802.971226][T27176] syzkaller0: entered allmulticast mode [ 1803.109820][T27180] syzkaller0: entered promiscuous mode [ 1803.123251][T27180] syzkaller0: entered allmulticast mode [ 1803.552491][T27201] netlink: 199836 bytes leftover after parsing attributes in process `syz.6.5458'. [ 1803.766087][T27204] netlink: 64859 bytes leftover after parsing attributes in process `syz.6.5459'. [ 1806.702433][T27211] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1811.410606][T27211] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5462'. [ 1811.425523][T27211] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5462'. [ 1811.441630][T27211] netlink: 3 bytes leftover after parsing attributes in process `syz.3.5462'. [ 1812.020623][T27234] syzkaller0: entered promiscuous mode [ 1812.170420][T27234] syzkaller0: entered allmulticast mode [ 1814.883906][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1815.119981][T27258] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1817.589811][T27258] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5480'. [ 1817.598976][T27258] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5480'. [ 1817.608256][T27258] netlink: 3 bytes leftover after parsing attributes in process `syz.0.5480'. [ 1817.646742][T27272] netlink: 'syz.4.5482': attribute type 10 has an invalid length. [ 1817.654630][T27272] netlink: 40 bytes leftover after parsing attributes in process `syz.4.5482'. [ 1818.195032][T27288] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5488'. [ 1818.252222][T27290] netlink: 'syz.6.5489': attribute type 10 has an invalid length. [ 1818.262918][T27290] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5489'. [ 1818.275010][T27288] netlink: 'syz.0.5488': attribute type 39 has an invalid length. [ 1818.465760][T27288] hsr_slave_1 (unregistering): left promiscuous mode [ 1819.027615][T27305] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1819.086155][T27305] netlink: 40 bytes leftover after parsing attributes in process `syz.6.5494'. [ 1819.118535][T27305] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5494'. [ 1819.142500][T27305] netlink: 3 bytes leftover after parsing attributes in process `syz.6.5494'. [ 1819.273063][T27307] syzkaller0: entered promiscuous mode [ 1819.279046][T27307] syzkaller0: entered allmulticast mode [ 1822.283971][T27318] netlink: 'syz.3.5500': attribute type 10 has an invalid length. [ 1822.292073][T27318] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5500'. [ 1822.315349][T27333] netlink: 'syz.6.5504': attribute type 4 has an invalid length. [ 1822.489119][T27340] netlink: 'syz.6.5507': attribute type 39 has an invalid length. [ 1822.517155][T27342] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1822.617061][T27340] hsr_slave_1 (unregistering): left promiscuous mode [ 1826.385792][T27376] netlink: 'syz.0.5516': attribute type 10 has an invalid length. [ 1826.393864][T27376] __nla_validate_parse: 1 callbacks suppressed [ 1826.393882][T27376] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5516'. [ 1826.482169][T27379] netlink: 14560 bytes leftover after parsing attributes in process `syz.4.5517'. [ 1826.834158][T27383] syzkaller0: entered promiscuous mode [ 1826.845649][T27383] syzkaller0: entered allmulticast mode [ 1826.875546][T27385] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1832.379754][T27395] netlink: 68 bytes leftover after parsing attributes in process `syz.6.5524'. [ 1832.399830][T27411] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5529'. [ 1832.606581][T27415] netlink: 'syz.6.5530': attribute type 10 has an invalid length. [ 1832.615098][T27415] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5530'. [ 1834.303715][T27445] netlink: 14560 bytes leftover after parsing attributes in process `syz.6.5540'. [ 1834.882623][T27460] netlink: 'syz.6.5543': attribute type 10 has an invalid length. [ 1834.944891][T27460] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5543'. [ 1838.850402][T27493] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1840.759027][T27527] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1842.643025][T27556] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1845.310640][T27560] netlink: 132 bytes leftover after parsing attributes in process `syz.3.5582'. [ 1845.532836][T27564] netlink: 'syz.4.5590': attribute type 10 has an invalid length. [ 1845.603680][T27569] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5585'. [ 1846.386508][T27581] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1849.110826][T27593] netlink: 'syz.3.5594': attribute type 10 has an invalid length. [ 1849.119126][T27593] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5594'. [ 1849.244494][T27597] raw_sendmsg: syz.3.5596 forgot to set AF_INET. Fix it! [ 1849.336957][T27597] netlink: 'syz.3.5596': attribute type 6 has an invalid length. [ 1849.353515][T27599] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5597'. [ 1849.933515][T27614] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1850.233055][T27620] netlink: 'syz.3.5605': attribute type 10 has an invalid length. [ 1850.256825][T27620] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5605'. [ 1853.534240][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1853.541936][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1853.742512][T27640] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1853.758249][T27638] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5613'. [ 1854.461981][T27653] netlink: 'syz.4.5619': attribute type 10 has an invalid length. [ 1854.665571][T27653] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5619'. [ 1854.709453][T27658] netlink: 'syz.6.5620': attribute type 10 has an invalid length. [ 1855.034573][T27658] team0: Device hsr_slave_0 failed to register rx_handler [ 1855.135934][T27664] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1855.284924][T27666] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5625'. [ 1856.212263][T27683] netlink: 'syz.0.5633': attribute type 10 has an invalid length. [ 1856.226335][T27683] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5633'. [ 1856.312848][T27685] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1857.175183][T27689] netlink: 'syz.0.5634': attribute type 10 has an invalid length. [ 1857.378604][T27689] team0: Device hsr_slave_0 failed to register rx_handler [ 1857.515028][T27701] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5640'. [ 1857.637750][T27707] netlink: 'syz.0.5643': attribute type 10 has an invalid length. [ 1857.650478][T27707] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5643'. [ 1859.714144][T27735] netlink: 'syz.3.5655': attribute type 10 has an invalid length. [ 1859.735873][T27735] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5655'. [ 1859.766805][T27737] netlink: 14560 bytes leftover after parsing attributes in process `syz.6.5656'. [ 1860.402055][T27759] netlink: 144316 bytes leftover after parsing attributes in process `syz.3.5664'. [ 1860.903483][T27772] netlink: 'syz.6.5668': attribute type 10 has an invalid length. [ 1860.927030][T27772] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5668'. [ 1861.178043][T27779] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5671'. [ 1861.294892][T27780] netlink: 830 bytes leftover after parsing attributes in process `syz.4.5669'. [ 1861.948011][T27797] netlink: 'syz.3.5680': attribute type 10 has an invalid length. [ 1861.975528][T27797] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5680'. [ 1862.523106][T27813] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5684'. [ 1863.490838][T27837] netlink: 'syz.6.5693': attribute type 10 has an invalid length. [ 1863.530237][T27837] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5693'. [ 1863.612788][T27816] netlink: 830 bytes leftover after parsing attributes in process `syz.3.5685'. [ 1864.482023][T27871] netlink: 'syz.0.5708': attribute type 10 has an invalid length. [ 1865.550116][T27897] netlink: 'syz.0.5721': attribute type 10 has an invalid length. [ 1865.563253][T27897] __nla_validate_parse: 4 callbacks suppressed [ 1865.563289][T27897] netlink: 156 bytes leftover after parsing attributes in process `syz.0.5721'. [ 1865.637971][T27901] netlink: 14560 bytes leftover after parsing attributes in process `syz.6.5723'. [ 1865.906429][T27912] netlink: 830 bytes leftover after parsing attributes in process `syz.4.5726'. [ 1866.343530][T27922] netlink: 14560 bytes leftover after parsing attributes in process `syz.4.5733'. [ 1866.777117][T27930] netlink: 'syz.4.5736': attribute type 10 has an invalid length. [ 1866.809035][T27930] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5736'. [ 1867.229745][T27947] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5744'. [ 1868.002172][T27975] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5758'. [ 1868.671968][T27995] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5768'. [ 1869.582536][T28024] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5781'. [ 1870.248771][T28048] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5793'. [ 1870.719529][T28060] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1873.284748][T28072] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.5805'. [ 1873.549966][T28082] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1873.957813][T28092] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5815'. [ 1874.593261][T28108] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1876.903299][T28118] netlink: 14560 bytes leftover after parsing attributes in process `syz.6.5826'. [ 1877.441331][T28138] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1877.489535][T28144] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5839'. [ 1880.767391][T28163] netlink: 14560 bytes leftover after parsing attributes in process `syz.6.5848'. [ 1881.418363][T28186] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1884.169278][T28193] netlink: 14560 bytes leftover after parsing attributes in process `syz.4.5860'. [ 1884.790223][T28216] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1884.869946][T28220] netlink: 14560 bytes leftover after parsing attributes in process `syz.6.5872'. [ 1888.222405][T28247] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1890.454871][T28259] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5883'. [ 1891.096733][T28286] netlink: 'syz.6.5892': attribute type 10 has an invalid length. [ 1891.133404][T28286] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5892'. [ 1891.213526][T28289] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5893'. [ 1894.019445][T28305] netlink: 'syz.6.5907': attribute type 10 has an invalid length. [ 1894.028913][T28305] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5907'. [ 1894.328149][T28318] netlink: 14560 bytes leftover after parsing attributes in process `syz.4.5902'. [ 1894.809007][T28330] syzkaller0: entered promiscuous mode [ 1894.820598][T28330] syzkaller0: entered allmulticast mode [ 1895.149646][T28339] netlink: 60 bytes leftover after parsing attributes in process `syz.3.5913'. [ 1897.540139][T28339] netlink: 60 bytes leftover after parsing attributes in process `syz.3.5913'. [ 1897.551068][T28346] netlink: 'syz.6.5915': attribute type 10 has an invalid length. [ 1897.559330][T28346] netlink: 156 bytes leftover after parsing attributes in process `syz.6.5915'. [ 1897.574542][T28349] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5916'. [ 1898.408810][T28371] netlink: 'syz.3.5925': attribute type 27 has an invalid length. [ 1898.455684][T28371] netlink: 164 bytes leftover after parsing attributes in process `syz.3.5925'. [ 1898.732529][T28377] syzkaller0: entered promiscuous mode [ 1898.741471][T28377] syzkaller0: entered allmulticast mode [ 1898.756634][T28378] netlink: 'syz.4.5927': attribute type 10 has an invalid length. [ 1898.771888][T28378] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5927'. [ 1907.559697][T28404] netlink: 'syz.3.5937': attribute type 16 has an invalid length. [ 1907.567876][T28404] netlink: 156 bytes leftover after parsing attributes in process `syz.3.5937'. [ 1907.577866][T28406] netlink: 'syz.4.5938': attribute type 10 has an invalid length. [ 1907.595520][T28406] netlink: 156 bytes leftover after parsing attributes in process `syz.4.5938'. [ 1907.941704][T28425] netlink: 'syz.6.5946': attribute type 27 has an invalid length. [ 1907.960320][T28425] netlink: 164 bytes leftover after parsing attributes in process `syz.6.5946'. [ 1911.452166][T28446] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1911.757103][T28457] netlink: 'syz.3.5961': attribute type 3 has an invalid length. [ 1911.765459][T28457] netlink: 'syz.3.5961': attribute type 1 has an invalid length. [ 1911.774126][T28457] netlink: 60387 bytes leftover after parsing attributes in process `syz.3.5961'. [ 1914.841031][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1914.849715][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1914.981270][T28471] netlink: 'syz.4.5967': attribute type 25 has an invalid length. [ 1915.224208][T28478] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1918.922831][T28505] syzkaller0: entered promiscuous mode [ 1918.940976][T28505] syzkaller0: entered allmulticast mode [ 1918.995348][T28509] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1919.698482][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1923.385532][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1926.764126][T28576] netlink: 'syz.3.6010': attribute type 27 has an invalid length. [ 1926.774086][T28576] netlink: 164 bytes leftover after parsing attributes in process `syz.3.6010'. [ 1927.499499][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1928.383684][T28535] netlink: 14560 bytes leftover after parsing attributes in process `syz.0.5995'. [ 1928.452724][T28568] syzkaller0: entered promiscuous mode [ 1928.470389][T28568] syzkaller0: entered allmulticast mode [ 1928.489575][T28592] netlink: 'syz.3.6017': attribute type 10 has an invalid length. [ 1928.518387][T28592] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6017'. [ 1932.003765][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1934.080261][T28615] netlink: 14560 bytes leftover after parsing attributes in process `syz.3.6026'. [ 1934.089930][T28620] netlink: 'syz.0.6028': attribute type 10 has an invalid length. [ 1934.108539][T28620] netlink: 156 bytes leftover after parsing attributes in process `syz.0.6028'. [ 1934.329957][T28628] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1937.472208][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1937.724337][T28645] netlink: 'syz.0.6039': attribute type 10 has an invalid length. [ 1937.736609][T28645] netlink: 156 bytes leftover after parsing attributes in process `syz.0.6039'. [ 1938.000006][T28656] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1938.353740][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1939.632948][T28684] netlink: 'syz.0.6053': attribute type 10 has an invalid length. [ 1939.671103][T28684] netlink: 156 bytes leftover after parsing attributes in process `syz.0.6053'. [ 1939.913410][T28690] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1939.961793][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1940.939006][T28717] netlink: 'syz.3.6069': attribute type 10 has an invalid length. [ 1940.959893][T28717] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6069'. [ 1941.012677][T28721] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1941.041320][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1944.311657][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1948.445244][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 1949.930447][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1956.298957][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1957.475051][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1957.670932][T28883] netlink: 60 bytes leftover after parsing attributes in process `syz.4.6131'. [ 1957.705279][T28883] netlink: 60 bytes leftover after parsing attributes in process `syz.4.6131'. [ 1957.731494][T28883] netlink: 60 bytes leftover after parsing attributes in process `syz.4.6131'. [ 1957.744742][T28883] netlink: 60 bytes leftover after parsing attributes in process `syz.4.6131'. [ 1958.760354][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1961.521157][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1962.493590][T28953] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6159'. [ 1962.505398][T28953] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6159'. [ 1962.544266][T28953] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6159'. [ 1962.563197][T28953] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6159'. [ 1965.147271][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 1966.064552][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1968.824155][T28998] syzkaller0: entered promiscuous mode [ 1968.830206][T28998] syzkaller0: entered allmulticast mode [ 1971.580667][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1975.197918][T29046] netlink: 'syz.4.6196': attribute type 3 has an invalid length. [ 1975.337778][T29046] netlink: 'syz.4.6196': attribute type 1 has an invalid length. [ 1975.411760][T29046] netlink: 60387 bytes leftover after parsing attributes in process `syz.4.6196'. [ 1975.544770][T29051] syzkaller0: entered promiscuous mode [ 1975.592434][T29051] syzkaller0: entered allmulticast mode [ 1975.714012][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1976.315034][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 1976.325284][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 1979.508240][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1981.635844][T29088] syzkaller0: entered promiscuous mode [ 1981.641520][T29088] syzkaller0: entered allmulticast mode [ 1987.788210][T29124] syzkaller0: entered promiscuous mode [ 1987.793759][T29124] syzkaller0: entered allmulticast mode [ 1991.050938][T29159] syzkaller0: entered promiscuous mode [ 1991.060320][T29159] syzkaller0: entered allmulticast mode [ 1991.136352][T29172] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1994.872482][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1995.142114][T29234] syzkaller0: entered promiscuous mode [ 1995.165204][T29234] syzkaller0: entered allmulticast mode [ 1995.503625][T29247] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1995.731139][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 1998.380166][T29269] netlink: 'syz.6.6273': attribute type 10 has an invalid length. [ 1998.391527][T29269] batman_adv: batadv0: Adding interface: netdevsim0 [ 1998.408645][T29269] batman_adv: batadv0: The MTU of interface netdevsim0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1998.436650][T29269] batman_adv: batadv0: Not using interface netdevsim0 (retrying later): interface not active [ 1998.601095][T29273] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 1998.709698][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 1998.898033][T29279] syzkaller0: entered promiscuous mode [ 1998.904005][T29279] syzkaller0: entered allmulticast mode [ 1999.849577][T21639] Bluetooth: hci4: unexpected event 0x1c length: 15 > 5 [ 2000.040479][T21639] Bluetooth: hci4: Malformed Event: 0x13 [ 2000.213387][T29306] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2001.720069][T29286] syzkaller0: entered promiscuous mode [ 2001.725951][T29286] syzkaller0: entered allmulticast mode [ 2005.307078][T29338] netlink: 14 bytes leftover after parsing attributes in process `syz.3.6303'. [ 2005.393357][T29339] syzkaller0: entered promiscuous mode [ 2005.406142][T29339] syzkaller0: entered allmulticast mode [ 2008.544723][T29372] syzkaller0: entered promiscuous mode [ 2008.575205][T29372] syzkaller0: entered allmulticast mode [ 2011.860412][T29424] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2012.248615][T21639] Bluetooth: hci3: unexpected event 0x1c length: 15 > 5 [ 2012.542198][T29443] syzkaller0: entered promiscuous mode [ 2012.556525][T29443] syzkaller0: entered allmulticast mode [ 2012.740686][T29453] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2016.001689][T29482] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2017.063756][T29505] syzkaller0: entered promiscuous mode [ 2017.069499][T29505] syzkaller0: entered allmulticast mode [ 2019.587118][T29522] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2024.249903][T29551] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2025.691441][T29567] netlink: 'syz.0.6389': attribute type 10 has an invalid length. [ 2026.290790][T29579] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2029.205722][T29596] syzkaller0: entered promiscuous mode [ 2029.216332][T29596] syzkaller0: entered allmulticast mode [ 2031.411539][T29624] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2035.246783][T29650] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2037.022004][T29678] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2037.275274][T29684] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6433'. [ 2037.288205][T29684] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6433'. [ 2037.302378][T29684] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6433'. [ 2037.320137][T29684] netlink: 60 bytes leftover after parsing attributes in process `syz.3.6433'. [ 2037.736761][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 2037.753468][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 2039.102310][T29717] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2039.132029][T29713] can: request_module (can-proto-5) failed. [ 2039.765199][T29748] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2039.971359][T29756] netlink: 'syz.0.6464': attribute type 29 has an invalid length. [ 2039.984333][T29756] netlink: 'syz.0.6464': attribute type 29 has an invalid length. [ 2039.999544][T29756] netlink: 'syz.0.6464': attribute type 29 has an invalid length. [ 2040.273479][T29770] netlink: 'syz.0.6469': attribute type 25 has an invalid length. [ 2040.298700][T29770] netlink: 'syz.0.6469': attribute type 29 has an invalid length. [ 2040.537293][T29777] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2044.198712][T29808] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2044.871339][T29822] syzkaller0: entered promiscuous mode [ 2044.879406][T29822] syzkaller0: entered allmulticast mode [ 2047.667667][T29836] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2051.763535][T29864] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2053.606726][T29884] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2057.457737][T29926] syzkaller0: entered promiscuous mode [ 2057.467491][T29926] syzkaller0: entered allmulticast mode [ 2060.556478][T29956] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2062.963547][T29959] netlink: 'syz.0.6542': attribute type 10 has an invalid length. [ 2062.977482][T29966] netlink: 'syz.3.6546': attribute type 21 has an invalid length. [ 2062.996496][T29966] netlink: 168 bytes leftover after parsing attributes in process `syz.3.6546'. [ 2067.045600][T29992] netlink: 'syz.3.6556': attribute type 10 has an invalid length. [ 2067.451785][T30001] syzkaller0: entered promiscuous mode [ 2067.459925][T30001] syzkaller0: entered allmulticast mode [ 2069.064208][T30036] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2071.926113][T30064] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2072.494188][T30080] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2073.550714][T30108] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2077.436534][T30138] Hÿ: renamed from wg2 (while UP) [ 2077.530693][T30142] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2077.557539][T30144] syzkaller0: tun_chr_ioctl cmd 35108 [ 2078.664051][T30147] delete_channel: no stack [ 2079.030052][T30181] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2080.498757][T30219] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2080.794406][T30229] netlink: 'syz.6.6656': attribute type 7 has an invalid length. [ 2081.123630][T30244] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2082.302425][T30279] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2085.690873][T30311] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2086.826003][T30328] syzkaller0: entered promiscuous mode [ 2086.867221][T30328] syzkaller0: entered allmulticast mode [ 2086.897458][T30332] netlink: 'syz.4.6699': attribute type 10 has an invalid length. [ 2086.911944][T30332] netlink: 156 bytes leftover after parsing attributes in process `syz.4.6699'. [ 2089.029811][T30341] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2091.978239][T30368] netlink: 'syz.3.6710': attribute type 10 has an invalid length. [ 2091.989017][T30368] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6710'. [ 2095.664711][T30400] syzkaller0: entered promiscuous mode [ 2095.680685][T30400] syzkaller0: entered allmulticast mode [ 2095.770507][T30404] netlink: 'syz.6.6723': attribute type 10 has an invalid length. [ 2095.790557][T30404] netlink: 156 bytes leftover after parsing attributes in process `syz.6.6723'. [ 2099.161032][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 2099.180444][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 2101.913230][T30426] netlink: 'syz.0.6732': attribute type 10 has an invalid length. [ 2101.921363][T30426] netlink: 156 bytes leftover after parsing attributes in process `syz.0.6732'. [ 2106.273474][T30455] netlink: 'syz.4.6743': attribute type 10 has an invalid length. [ 2106.294133][T30455] netlink: 156 bytes leftover after parsing attributes in process `syz.4.6743'. [ 2106.672415][T30460] syzkaller0: entered promiscuous mode [ 2106.703385][T30460] syzkaller0: entered allmulticast mode [ 2111.079229][T30482] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2112.704030][T30484] netlink: 'syz.3.6753': attribute type 10 has an invalid length. [ 2112.712416][T30484] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6753'. [ 2114.193000][T30507] do_dccp_setsockopt: sockopt(CHANGE_L/R) is deprecated: fix your app [ 2117.035942][T30517] syzkaller0: entered promiscuous mode [ 2117.065492][T30517] syzkaller0: entered allmulticast mode [ 2118.000369][T21639] Bluetooth: hci0: Malformed Event: 0x13 [ 2123.107670][T30548] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 2123.120671][T30548] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 2123.132589][T30548] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 2123.144895][T30548] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 2123.159224][T30548] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 2123.167244][T30548] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 2123.868698][T30547] chnl_net:caif_netlink_parms(): no params data found [ 2123.971004][T30547] bridge0: port 1(bridge_slave_0) entered blocking state [ 2123.978738][T30547] bridge0: port 1(bridge_slave_0) entered disabled state [ 2123.986217][T30547] bridge_slave_0: entered allmulticast mode [ 2123.993849][T30547] bridge_slave_0: entered promiscuous mode [ 2124.216224][T21639] Bluetooth: hci2: Malformed Event: 0x13 [ 2124.330489][T30547] bridge0: port 2(bridge_slave_1) entered blocking state [ 2124.339369][T30547] bridge0: port 2(bridge_slave_1) entered disabled state [ 2124.349434][T30547] bridge_slave_1: entered allmulticast mode [ 2124.363562][T30547] bridge_slave_1: entered promiscuous mode [ 2124.421961][T30547] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2124.452869][T30547] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2124.500811][T30547] team0: Port device team_slave_0 added [ 2124.511647][T30547] team0: Port device team_slave_1 added [ 2124.549881][T30547] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 2124.557005][T30547] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2124.584150][T30547] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 2124.598610][T30547] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 2124.606124][T30547] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 2124.633057][T30547] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 2124.730805][T30547] hsr_slave_0: entered promiscuous mode [ 2124.766605][T30547] hsr_slave_1: entered promiscuous mode [ 2124.781184][T30547] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 2124.805265][T30547] Cannot create hsr debugfs directory [ 2125.035062][T30571] syzkaller0: entered promiscuous mode [ 2125.040689][T30571] syzkaller0: entered allmulticast mode [ 2125.235364][T21639] Bluetooth: hci1: command tx timeout [ 2125.609043][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 2127.325466][T21639] Bluetooth: hci1: command tx timeout [ 2128.245918][T30575] netlink: 'syz.3.6782': attribute type 10 has an invalid length. [ 2128.254094][T30575] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6782'. [ 2128.913488][T21639] Bluetooth: hci3: Malformed Event: 0x13 [ 2129.395292][T21639] Bluetooth: hci1: command tx timeout [ 2130.431612][T30627] syzkaller0: entered promiscuous mode [ 2130.451514][T30627] syzkaller0: entered allmulticast mode [ 2131.475413][T21639] Bluetooth: hci1: command tx timeout [ 2134.325171][T30547] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 2134.375832][T30547] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 2134.401339][T30547] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 2134.453374][T30547] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 2134.579304][T30687] syzkaller0: entered promiscuous mode [ 2134.584956][T30687] syzkaller0: entered allmulticast mode [ 2137.615822][T30707] netlink: 'syz.3.6799': attribute type 10 has an invalid length. [ 2137.624344][T30707] netlink: 156 bytes leftover after parsing attributes in process `syz.3.6799'. [ 2137.731809][T30547] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2137.788796][T30547] 8021q: adding VLAN 0 to HW filter on device team0 [ 2137.818333][T11537] bridge0: port 1(bridge_slave_0) entered blocking state [ 2137.825556][T11537] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2137.873535][T13083] bridge0: port 2(bridge_slave_1) entered blocking state [ 2137.880847][T13083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2138.001653][T30547] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 2138.903612][T21639] Bluetooth: hci2: unexpected event 0x12 length: 15 > 8 [ 2138.991683][T30547] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 2139.531023][T30547] veth0_vlan: entered promiscuous mode [ 2139.551100][T30547] veth1_vlan: entered promiscuous mode [ 2139.613531][T30547] veth0_macvtap: entered promiscuous mode [ 2139.632555][T30547] veth1_macvtap: entered promiscuous mode [ 2139.683256][T30547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2139.697821][T30547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2139.712471][T30547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 2139.726866][T30547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2139.744222][T30547] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 2139.758685][T30547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2139.769866][T30547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2139.780395][T30547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2139.791336][T30547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2139.802546][T30547] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 2139.813225][T30547] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 2139.825362][T30547] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 2139.839691][T30547] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2139.850892][T30547] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2139.860280][T30547] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2139.872000][T30547] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2140.017809][ T1086] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2140.036314][ T1086] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2140.082691][T12846] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 2140.092455][T12846] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 2160.599990][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 2160.609053][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 2222.038634][ T1286] ieee802154 phy0 wpan0: encryption failed: -22 [ 2222.045764][ T1286] ieee802154 phy1 wpan1: encryption failed: -22 [ 2249.726074][T30548] Bluetooth: hci1: command 0x0406 tx timeout [ 2271.315530][ T28] INFO: task syz.4.6749:30473 blocked for more than 143 seconds. [ 2271.323355][ T28] Not tainted syzkaller #0 [ 2271.328402][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2271.347154][ T28] task:syz.4.6749 state:D stack:23208 pid:30473 ppid:24348 flags:0x00004006 [ 2271.356754][ T28] Call Trace: [ 2271.360168][ T28] [ 2271.363165][ T28] __schedule+0x1553/0x45a0 [ 2271.367898][ T28] ? rcu_is_watching+0x15/0xb0 [ 2271.372739][ T28] ? asan.module_dtor+0x20/0x20 [ 2271.377778][ T28] ? trace_contention_end+0x39/0xe0 [ 2271.383108][ T28] ? perf_event_ctx_lock_nested+0x490/0x490 [ 2271.389116][ T28] ? task_work_cancel+0xa5/0x220 [ 2271.394205][ T28] ? task_work_cancel_func+0x210/0x210 [ 2271.400539][ T28] schedule+0xbd/0x170 [ 2271.404654][ T28] ? _free_event+0xfe/0xf30 [ 2271.409390][ T28] _free_event+0x174/0xf30 [ 2271.413864][ T28] perf_event_release_kernel+0x842/0x8d0 [ 2271.419633][ T28] ? __might_sleep+0xe0/0xe0 [ 2271.424269][ T28] ? calc_timer_values+0x400/0x400 [ 2271.429476][ T28] ? perf_mmap+0x15c0/0x15c0 [ 2271.434366][ T28] perf_release+0x3b/0x40 [ 2271.438787][ T28] __fput+0x234/0x970 [ 2271.442908][ T28] task_work_run+0x1d4/0x260 [ 2271.447676][ T28] ? task_work_cancel+0x220/0x220 [ 2271.452932][ T28] get_signal+0x1235/0x13f0 [ 2271.457678][ T28] ? create_io_thread+0x190/0x190 [ 2271.462746][ T28] arch_do_signal_or_restart+0xc2/0x800 [ 2271.468541][ T28] ? __x64_sys_clone+0x1b7/0x230 [ 2271.473684][ T28] ? get_sigframe_size+0x20/0x20 [ 2271.478725][ T28] ? exit_to_user_mode_loop+0x3b/0x110 [ 2271.484220][ T28] exit_to_user_mode_loop+0x70/0x110 [ 2271.489563][ T28] exit_to_user_mode_prepare+0xee/0x180 [ 2271.495230][ T28] syscall_exit_to_user_mode+0x1a/0x50 [ 2271.500915][ T28] do_syscall_64+0x61/0xa0 [ 2271.505845][ T28] ? clear_bhb_loop+0x40/0x90 [ 2271.510717][ T28] ? clear_bhb_loop+0x40/0x90 [ 2271.515763][ T28] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 2271.521856][ T28] RIP: 0033:0x7fb3a359bf79 [ 2271.526398][ T28] RSP: 002b:00007fb3a17f5fd8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2271.534854][ T28] RAX: fffffffffffffffc RBX: 00007fb3a3815fa0 RCX: 00007fb3a359bf79 [ 2271.542937][ T28] RDX: 0000000000000000 RSI: 000000000003fff0 RDI: 00000000630c1000 [ 2271.551195][ T28] RBP: 00007fb3a36327e0 R08: 0000000000000000 R09: 0000000000000000 [ 2271.559442][ T28] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 2271.567502][ T28] R13: 00007fb3a3816038 R14: 00007fb3a3815fa0 R15: 00007ffde10847f8 [ 2271.575613][ T28] [ 2271.578690][ T28] [ 2271.578690][ T28] Showing all locks held in the system: [ 2271.592419][ T28] 1 lock held by khungtaskd/28: [ 2271.597850][ T28] #0: ffffffff8d131fe0 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x55/0x290 [ 2271.608873][ T28] 2 locks held by getty/5533: [ 2271.613585][ T28] #0: ffff888031afa0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 [ 2271.623537][ T28] #1: ffffc9000326e2f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x433/0x1390 [ 2271.633938][ T28] [ 2271.636450][ T28] ============================================= [ 2271.636450][ T28] [ 2271.645069][ T28] NMI backtrace for cpu 1 [ 2271.649512][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted syzkaller #0 [ 2271.656821][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2271.667207][ T28] Call Trace: [ 2271.670531][ T28] [ 2271.673483][ T28] dump_stack_lvl+0x18c/0x250 [ 2271.678269][ T28] ? show_regs_print_info+0x20/0x20 [ 2271.683468][ T28] ? load_image+0x400/0x400 [ 2271.687989][ T28] nmi_cpu_backtrace+0x3a6/0x3e0 [ 2271.692983][ T28] ? nmi_trigger_cpumask_backtrace+0x2f0/0x2f0 [ 2271.699151][ T28] ? _printk+0xde/0x130 [ 2271.703317][ T28] ? load_image+0x400/0x400 [ 2271.707972][ T28] ? load_image+0x400/0x400 [ 2271.712689][ T28] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 2271.718822][ T28] nmi_trigger_cpumask_backtrace+0x17a/0x2f0 [ 2271.724840][ T28] watchdog+0xf3d/0xf80 [ 2271.729049][ T28] ? watchdog+0x1e1/0xf80 [ 2271.733405][ T28] kthread+0x2fa/0x390 [ 2271.737489][ T28] ? hungtask_pm_notify+0x90/0x90 [ 2271.742827][ T28] ? kthread_blkcg+0xd0/0xd0 [ 2271.747610][ T28] ret_from_fork+0x48/0x80 [ 2271.752132][ T28] ? kthread_blkcg+0xd0/0xd0 [ 2271.756764][ T28] ret_from_fork_asm+0x11/0x20 [ 2271.761587][ T28] [ 2271.765321][ T28] Sending NMI from CPU 1 to CPUs 0: [ 2271.770670][ C0] NMI backtrace for cpu 0 [ 2271.770683][ C0] CPU: 0 PID: 1086 Comm: kworker/u4:6 Not tainted syzkaller #0 [ 2271.770699][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2271.770708][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 2271.770784][ C0] RIP: 0010:unwind_next_frame+0x2b2/0x2970 [ 2271.770803][ C0] Code: 8f 0f 83 f4 1c 00 00 48 8d 44 6d 00 48 8d 84 00 84 68 08 8f 48 3d d0 08 b2 8f 0f 87 db 1c 00 00 89 ef 44 89 ee e8 5e dd 4b 00 <44> 39 ed 0f 85 88 01 00 00 e8 d0 db 4b 00 49 bd 00 00 00 00 00 fc [ 2271.770817][ C0] RSP: 0018:ffffc9000465f2d8 EFLAGS: 00000293 [ 2271.770830][ C0] RAX: ffffffff813b38d2 RBX: dffffc0000000000 RCX: 0000000000000000 [ 2271.770842][ C0] RDX: ffff888023ec5a00 RSI: 000000000000a836 RDI: 000000000000a845 [ 2271.770853][ C0] RBP: 000000000000a845 R08: ffffc9000465f470 R09: 000000000000000c [ 2271.770864][ C0] R10: 0000000000000004 R11: 0000000000000000 R12: ffffc9000465f3a8 [ 2271.770874][ C0] R13: 000000000000a836 R14: ffffc9000465f3dd R15: 000000000000310c [ 2271.770885][ C0] FS: 0000000000000000(0000) GS:ffff8880b8e00000(0000) knlGS:0000000000000000 [ 2271.770899][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2271.770911][ C0] CR2: 0000562dd6fb2168 CR3: 000000000cf32000 CR4: 00000000003506f0 [ 2271.770928][ C0] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 2271.770938][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 2271.770948][ C0] Call Trace: [ 2271.770954][ C0] [ 2271.770965][ C0] ? ret_from_fork+0x47/0x80 [ 2271.770986][ C0] ? ret_from_fork+0x48/0x80 [ 2271.771004][ C0] ? ret_from_fork+0x48/0x80 [ 2271.771021][ C0] ? stack_trace_save+0x100/0x100 [ 2271.771048][ C0] arch_stack_walk+0x144/0x190 [ 2271.771067][ C0] ? ret_from_fork+0x48/0x80 [ 2271.771086][ C0] stack_trace_save+0xaa/0x100 [ 2271.771105][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 2271.771121][ C0] ? mark_lock+0x94/0x320 [ 2271.771143][ C0] save_stack+0x125/0x230 [ 2271.771166][ C0] ? __reset_page_owner+0x190/0x190 [ 2271.771186][ C0] ? seqcount_lockdep_reader_access+0x10a/0x190 [ 2271.771211][ C0] ? post_alloc_hook+0x1c1/0x200 [ 2271.771230][ C0] ? get_page_from_freelist+0x1951/0x19e0 [ 2271.771244][ C0] ? __alloc_pages+0x1f0/0x460 [ 2271.771264][ C0] ? alloc_slab_page+0x5d/0x160 [ 2271.771278][ C0] ? new_slab+0x87/0x2d0 [ 2271.771297][ C0] ? ___slab_alloc+0xc5d/0x12f0 [ 2271.771316][ C0] ? kmem_cache_alloc_node+0x1e6/0x320 [ 2271.771343][ C0] ? __alloc_skb+0x103/0x2c0 [ 2271.771434][ C0] ? nsim_dev_trap_report_work+0x293/0xb00 [ 2271.771449][ C0] ? process_scheduled_works+0xa5d/0x15d0 [ 2271.771467][ C0] ? worker_thread+0xa55/0xfc0 [ 2271.771484][ C0] ? kthread+0x2fa/0x390 [ 2271.771498][ C0] ? ret_from_fork+0x48/0x80 [ 2271.771516][ C0] ? get_page_from_freelist+0x6a8/0x19e0 [ 2271.771532][ C0] ? __lock_acquire+0x7d40/0x7d40 [ 2271.771552][ C0] __set_page_owner+0x1d/0x60 [ 2271.771574][ C0] post_alloc_hook+0x1c1/0x200 [ 2271.771595][ C0] get_page_from_freelist+0x1951/0x19e0 [ 2271.771620][ C0] ? __next_zones_zonelist+0x9d/0x130 [ 2271.771643][ C0] ? prepare_alloc_pages+0x366/0x5f0 [ 2271.771667][ C0] __alloc_pages+0x1f0/0x460 [ 2271.771689][ C0] ? zone_statistics+0x170/0x170 [ 2271.771709][ C0] ? mark_lock+0x94/0x320 [ 2271.771728][ C0] ? alloc_pages+0x4dc/0x740 [ 2271.771743][ C0] ? lock_chain_count+0x20/0x20 [ 2271.771758][ C0] ? mark_lock+0x94/0x320 [ 2271.771775][ C0] alloc_slab_page+0x5d/0x160 [ 2271.771791][ C0] new_slab+0x87/0x2d0 [ 2271.771812][ C0] ___slab_alloc+0xc5d/0x12f0 [ 2271.771835][ C0] ? __alloc_skb+0x103/0x2c0 [ 2271.771858][ C0] kmem_cache_alloc_node+0x1e6/0x320 [ 2271.771878][ C0] ? slab_free_freelist_hook+0x130/0x1a0 [ 2271.771892][ C0] ? __alloc_skb+0x103/0x2c0 [ 2271.771914][ C0] __alloc_skb+0x103/0x2c0 [ 2271.771936][ C0] nsim_dev_trap_report_work+0x293/0xb00 [ 2271.771960][ C0] ? process_scheduled_works+0x96f/0x15d0 [ 2271.771978][ C0] process_scheduled_works+0xa5d/0x15d0 [ 2271.772009][ C0] ? assign_work+0x430/0x430 [ 2271.772058][ C0] ? assign_work+0x3d0/0x430 [ 2271.772078][ C0] worker_thread+0xa55/0xfc0 [ 2271.772107][ C0] kthread+0x2fa/0x390 [ 2271.772121][ C0] ? pr_cont_work+0x560/0x560 [ 2271.772139][ C0] ? kthread_blkcg+0xd0/0xd0 [ 2271.772154][ C0] ret_from_fork+0x48/0x80 [ 2271.772171][ C0] ? kthread_blkcg+0xd0/0xd0 [ 2271.772186][ C0] ret_from_fork_asm+0x11/0x20 [ 2271.772213][ C0] [ 2271.785170][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 2271.785187][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted syzkaller #0 [ 2271.785208][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 [ 2271.785219][ T28] Call Trace: [ 2271.785226][ T28] [ 2271.785234][ T28] dump_stack_lvl+0x18c/0x250 [ 2271.785270][ T28] ? show_regs_print_info+0x20/0x20 [ 2271.785294][ T28] ? load_image+0x400/0x400 [ 2271.785326][ T28] panic+0x2dc/0x730 [ 2271.785344][ T28] ? schedule_preempt_disabled+0x20/0x20 [ 2271.785373][ T28] ? bpf_jit_dump+0xd0/0xd0 [ 2271.785391][ T28] ? __irq_work_queue_local+0x13a/0x3b0 [ 2271.785417][ T28] ? nmi_trigger_cpumask_backtrace+0x2a4/0x2f0 [ 2271.785448][ T28] watchdog+0xf7c/0xf80 [ 2271.785473][ T28] ? watchdog+0x1e1/0xf80 [ 2271.785501][ T28] kthread+0x2fa/0x390 [ 2271.785518][ T28] ? hungtask_pm_notify+0x90/0x90 [ 2271.785540][ T28] ? kthread_blkcg+0xd0/0xd0 [ 2271.785558][ T28] ret_from_fork+0x48/0x80 [ 2271.785577][ T28] ? kthread_blkcg+0xd0/0xd0 [ 2271.785596][ T28] ret_from_fork_asm+0x11/0x20 [ 2271.785631][ T28] [ 2271.787697][ T28] Kernel Offset: disabled [ 2272.324976][ T28] Rebooting in 86400 seconds..