last executing test programs: 9.339218423s ago: executing program 2 (id=252): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x5, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000000300)={&(0x7f0000000180)=@caif=@dbg, 0x80, &(0x7f0000001b00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000880)=""/68, 0x44}], 0x7, &(0x7f0000000280)=""/38, 0x26}, 0x10000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_move_numa\x00', r1, 0x0, 0x200}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xe, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000440)='kfree\x00', r6, 0x0, 0xffffffffffff6326}, 0x18) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) 8.791900857s ago: executing program 2 (id=258): socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffe}, 0x15f}, 0x48) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x18842, 0x100000000000000, 0x7, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000380)="e25eada5cfd258512c896737422c2232618479a9d801f3577b5e43451d8ffff98d20570ff9ab414d0b96cb5714160cd7ffab5a81937e3987b81b7f3e7601c4f8b7037385e8fd22cb7485a4ad980cebcef08c3c0fd003b06e92463d4c8cd8f57c664f57fe0da9011e64c1005f6bf291abed8c9e38a5135b7e4f1b055efb4582741ce555caa92dec6a6d2f650caab7aa21f559abf001e536c5325d66af14b90e408d908c0258cb95e387e07488818916d6ad3a97ac5a18dc246978ee58b07f36dd01d90ec41ee73b7cd4e38f9b4e13ac214d", 0xd1}], 0x1, &(0x7f0000000540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @loopback, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffff4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x401}}, @ip_retopts={{0x40, 0x0, 0x7, {[@cipso={0x86, 0x2d, 0x3, [{0x6, 0xd, "c2b145eef065f6649cd4fb"}, {0x6, 0x7, "c8535ba16f"}, {0x1, 0xf, "764291e08aa23782244bf894d6"}, {0x1, 0x4, "e423"}]}]}}}, @ip_retopts={{0xd0, 0x0, 0x7, {[@cipso={0x86, 0xf, 0x1, [{0x2, 0x9, "c00e9051ca2354"}]}, @lsrr={0x83, 0xf, 0xcf, [@multicast1, @private=0xa010102, @remote]}, @ssrr={0x89, 0x17, 0x6c, [@remote, @multicast2, @multicast2, @local, @dev={0xac, 0x14, 0x14, 0x23}]}, @timestamp={0x44, 0xc, 0xed, 0x0, 0x4, [0x6, 0x7]}, @ssrr={0x89, 0xf, 0xa3, [@local, @empty, @broadcast]}, @timestamp_prespec={0x44, 0x4c, 0x97, 0x3, 0xe, [{@multicast2, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@private=0xa010101, 0x7}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x7}, {@multicast2, 0x9}, {@rand_addr=0x64010100, 0x2}, {@dev={0xac, 0x14, 0x14, 0x33}, 0x5}, {@empty, 0x3}, {@loopback, 0x9}]}, @ssrr={0x89, 0x23, 0xdf, [@remote, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x35}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @empty, @remote]}]}}}], 0x1a8}, 0x840) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = getpid() r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80100, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x90c, 0x401, 0x1, 0x4, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='inet_sock_set_state\x00', r5}, 0x10) r6 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r6, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r4, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 6.131491868s ago: executing program 2 (id=262): r0 = socket$kcm(0x11, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="5c00000013006bcd9e3fe3dceb48aa31086b8703110000001fc3000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r2, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@generic={0x0, r4}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x8000}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='qgroup_meta_reserve\x00', 0xffffffffffffffff, 0x0, 0x3eb}, 0x18) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r7 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r8 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000619b000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702faff07000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r9, 0x0, 0xe, 0x0, &(0x7f0000000380)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r7, 0x84, 0x1f, &(0x7f0000000000), 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000200)={r7}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(r0, &(0x7f00000000c0)={&(0x7f0000000040)=@phonet={0x23, 0x0, 0x0, 0x27}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x41, 0x102}}], 0x18}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, r8}, 0x94) 6.096288601s ago: executing program 0 (id=263): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x5, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000000300)={&(0x7f0000000180)=@caif=@dbg, 0x80, &(0x7f0000001b00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000880)=""/68, 0x44}], 0x7, &(0x7f0000000280)=""/38, 0x26}, 0x10000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) 5.835673417s ago: executing program 1 (id=265): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x5, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000000300)={&(0x7f0000000180)=@caif=@dbg, 0x80, &(0x7f0000001b00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000880)=""/68, 0x44}], 0x7, &(0x7f0000000280)=""/38, 0x26}, 0x10000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_move_numa\x00', r1, 0x0, 0x200}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xe, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000440)='kfree\x00', r6, 0x0, 0xffffffffffff6326}, 0x18) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) 5.739255746s ago: executing program 0 (id=266): socket$kcm(0x10, 0x400000002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x50) close(0x3) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000008c0), 0x16000, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, 0x0) write$cgroup_subtree(r0, 0x0, 0xe) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000680)=[{&(0x7f0000000000)="5c00000014006b05c84e21000ab16d6e230675f802000000440002005817d30461bc24eeb556a705251e6182149a36c23d3b48dfd8cdbf9367b098fa51f60a64c9f408000000e786a6d0bdd70000b6c0504bb9189d9193e9bd1c1b78", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) r4 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="1400000016000b63d25a80648c2594f913", 0x11}], 0x1}, 0x0) r5 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r5, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="b747223d7bc0c59886be0f7fafeba9e9ba05", 0x12}, {&(0x7f0000000300)="27cdc8ece023d9f584f91b8e29118f8ec8c4f7a0ab646bf80706b3e6fa09b01f22992054018248dc2bab25369587639eef736b56d4cdc86809594e90877a8da35bc6eabde037e0cf6d3134749c354420b5632cc8af58e8c3cc0da826bfd514e357f1080eb2a3ffed0417e4fc64ec620166a97bdcf1d621dadf3caeec72a7302b45650ed5410673f9c725efdd8f8135466936aae3a25503fe0c3a7af8a441502cef9fe6a0efc95f11bfde74b9358c381a6c7fb72ec511a469e5cf3123035a9c244d306daaba6e8e00cd60", 0xca}, {&(0x7f0000000140)="d7681016cd60fd67f52e8588e77065aaa7291103b0d372caff10866f974ee84e2825198fe1ae0d2f601352f2393b9c41f4520722e6c3ca77b1a26c62087b07deb7ae2f972b167f0a1f04274a386211f8b6cc4cf71d80d268fc4a9047f3e5168e5a495b2dbcacd513521d8321dececc2f55ed0041ca7c6a1643a263fc2a09e60efeeb9cf6d4be2db9175c74b09368e53462f289662d025b", 0x97}], 0x3, &(0x7f0000000400)}, 0x4000084) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x80200, 0x0) ioctl$TUNSETDEBUG(r6, 0x400454c9, &(0x7f0000000040)) r7 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) sendmsg$kcm(r7, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="d800000010008104687da3aa7143a0b8c81d080b25000000e8fe55a1182c1500060014000000001208000a0043000000a80016000400014006000d00036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e857d01e91d8ef52a9d7c7c0b7a196e6f66112c88ac417898516277ce06bbace80177ccbec4c2ee5a7cef4260000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c0aaa16b8ddc64193071e9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb14feb9f5588a63644c", 0xd8}], 0x1}, 0x4008000) 5.545640325s ago: executing program 2 (id=267): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f000801}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@generic={0x0, r5}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x8000}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='qgroup_meta_reserve\x00', 0xffffffffffffffff, 0x0, 0x3eb}, 0x18) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r8 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000619b000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702faff07000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r10, 0x0, 0xe, 0x0, &(0x7f0000000380)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r8, 0x84, 0x1f, &(0x7f0000000000), 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r8}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@phonet={0x23, 0x0, 0x0, 0x27}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x41, 0x102}}], 0x18}, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, r9}, 0x94) 5.330163276s ago: executing program 1 (id=268): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x1, 0x106) sendmsg$sock(r2, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x400c0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x9a) r3 = socket$kcm(0x10, 0x2, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xdc}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x1, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000f000000850000002e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r8, 0x1, 0x32, &(0x7f0000000040)=r7, 0x4) write$cgroup_subtree(r6, &(0x7f0000000240)=ANY=[@ANYBLOB="2b6465766963657320a1ee7265657a657220"], 0x12) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002400)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000000000000000200000000000000000000000000000a03000000000000"], 0x0, 0x56}, 0x28) sendmsg$inet(r3, 0x0, 0x0) gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x10090) r9 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r9, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00000000", @ANYRES32=0x0, @ANYBLOB="ac141411e0000001000000002000000000000000000000000700000001440c07716401010100000000000000"], 0x40}, 0x200040c4) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x4000000000400002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x103f0e, 0x8001, 0x4, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) r12 = perf_event_open(&(0x7f00000014c0)={0x5, 0x80, 0x0, 0xff, 0xff, 0xfc, 0x0, 0x1, 0x4041, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x1590, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x5452, &(0x7f0000000b80)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80\x86\x1b\x05\xe6\"\x1d\f\xaey\x06\xd9$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3B\xc3\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2') 5.329509227s ago: executing program 3 (id=269): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1da}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:0/N'], 0x6a) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000780)={&(0x7f0000000400)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x3, 0x4}}, 0x10, &(0x7f0000000640), 0x0, &(0x7f00000006c0)="84122b5336cfeed1d08262e7a18dd934130825bd34439965177b564cd942564779c43c68eaffe24829bcc25a1d2de7815cb23d250fd8a2a1404004765a73415bfc60158e313905894f46d1c8cb3e6736199032e5bbf16e", 0x57, 0xc001}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='map\x00', 0xffffffffffffffff, 0x0, 0x200}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffc}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_devices(r1, 0x0, 0xffdd) write$cgroup_devices(r0, &(0x7f0000000840)=ANY=[], 0xffdd) 5.188450091s ago: executing program 0 (id=270): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, [@generic={0x18, 0x1, 0x2, 0x8000, 0xf3}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:0/N'], 0x6a) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000780)={&(0x7f0000000400)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x3, 0x4}}, 0x10, 0x0, 0x0, &(0x7f00000006c0)="84122b5336cfeed1d08262e7a18dd934130825bd34439965177b564cd942564779c43c68eaffe24829bcc25a1d2de7815cb23d250fd8a2a1404004765a73415bfc60158e313905894f46d1c8cb3e6736199032e5bbf16eb643f317ba8856bf5f83f9e924ba539ced3c4fd8b9848a6c786feff21b36c051337405a7a020b920ef1d", 0x81, 0xc001}, 0x4) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_devices(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef2885"], 0xffdd) write$cgroup_devices(r0, &(0x7f0000000840)=ANY=[], 0xffdd) 4.969233992s ago: executing program 2 (id=271): socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffffe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffe}, 0x15f}, 0x48) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0xf, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x18842, 0x100000000000000, 0x7, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000380)="e25eada5cfd258512c896737422c2232618479a9d801f3577b5e43451d8ffff98d20570ff9ab414d0b96cb5714160cd7ffab5a81937e3987b81b7f3e7601c4f8b7037385e8fd22cb7485a4ad980cebcef08c3c0fd003b06e92463d4c8cd8f57c664f57fe0da9011e64c1005f6bf291abed8c9e38a5135b7e4f1b055efb4582741ce555caa92dec6a6d2f650caab7aa21f559abf001e536c5325d66af14b90e408d908c0258cb95e387e07488818916d6ad3a97ac5a18dc246978ee58b07f36dd01d90ec41ee73b7cd4e38f9b4e13ac214d", 0xd1}], 0x1, &(0x7f0000000540)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @loopback, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xfffffff4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff7}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x401}}, @ip_retopts={{0x40, 0x0, 0x7, {[@cipso={0x86, 0x2d, 0x3, [{0x6, 0xd, "c2b145eef065f6649cd4fb"}, {0x6, 0x7, "c8535ba16f"}, {0x1, 0xf, "764291e08aa23782244bf894d6"}, {0x1, 0x4, "e423"}]}]}}}, @ip_retopts={{0xd0, 0x0, 0x7, {[@cipso={0x86, 0xf, 0x1, [{0x2, 0x9, "c00e9051ca2354"}]}, @lsrr={0x83, 0xf, 0xcf, [@multicast1, @private=0xa010102, @remote]}, @ssrr={0x89, 0x17, 0x6c, [@remote, @multicast2, @multicast2, @local, @dev={0xac, 0x14, 0x14, 0x23}]}, @timestamp={0x44, 0xc, 0xed, 0x0, 0x4, [0x6, 0x7]}, @ssrr={0x89, 0xf, 0xa3, [@local, @empty, @broadcast]}, @timestamp_prespec={0x44, 0x4c, 0x97, 0x3, 0xe, [{@multicast2, 0x7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x8}, {@private=0xa010101, 0x7}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x7}, {@multicast2, 0x9}, {@rand_addr=0x64010100, 0x2}, {@dev={0xac, 0x14, 0x14, 0x33}, 0x5}, {@empty, 0x3}, {@loopback, 0x9}]}, @ssrr={0x89, 0x23, 0xdf, [@remote, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x35}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @empty, @remote]}]}}}], 0x1a8}, 0x840) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = getpid() r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x3, 0x80100, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x90c, 0x401, 0x1, 0x4, 0x1, 0x200, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000000)='inet_sock_set_state\x00', r5}, 0x10) r6 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r6, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, r4, 0x0, 0xffffffffffffffff, 0x2) syz_clone(0x41064400, 0x0, 0x0, 0x0, 0x0, 0x0) close(0x3) 4.835072375s ago: executing program 1 (id=272): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) 2.733583941s ago: executing program 3 (id=273): bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x37, 0x1c}, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xb, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0x1, 0x12) 2.674001617s ago: executing program 1 (id=274): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='rpcb_setport\x00', r1, 0x0, 0x8}, 0x18) r2 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, 0x0}, 0x8000000) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x111026, 0x6, 0x6, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1000000, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x40000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x3, 0x9}, 0x0, 0x0, 0x89, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x70c551cb0a2f96bb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) 2.516765482s ago: executing program 3 (id=275): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="5c00000013006bcd9e3fe3dceb48aa31086b8703110000001fc3000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@generic={0x0, r5}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x8000}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='qgroup_meta_reserve\x00', 0xffffffffffffffff, 0x0, 0x3eb}, 0x18) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r7 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000619b000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702faff07000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00'}, 0x94) setsockopt$sock_attach_bpf(r7, 0x84, 0x1f, &(0x7f0000000000), 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r7}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@phonet={0x23, 0x0, 0x0, 0x27}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x41, 0x102}}], 0x18}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r8) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x94) 990.190862ms ago: executing program 3 (id=276): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="5c00000013006bcd9e3fe3dceb48aa31086b8703110000001fc3000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@generic={0x0}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x8000}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='qgroup_meta_reserve\x00', 0xffffffffffffffff, 0x0, 0x3eb}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r6 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r7 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000619b000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702faff07000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r8, 0x0, 0xe, 0x0, &(0x7f0000000380)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r6, 0x84, 0x1f, &(0x7f0000000000), 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r6}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@phonet={0x23, 0x0, 0x0, 0x27}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x41, 0x102}}], 0x18}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, r7}, 0x94) 968.080244ms ago: executing program 1 (id=277): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, 0xfffffffffffffffe, 0x0}, 0x20) 952.997816ms ago: executing program 0 (id=278): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={&(0x7f00000000c0), 0xa}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x5, &(0x7f0000000780), 0x4) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140), 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = socket$kcm(0x21, 0x2, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r3, &(0x7f0000000300)={&(0x7f0000000180)=@caif=@dbg, 0x80, &(0x7f0000001b00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000880)=""/68, 0x44}], 0x7, &(0x7f0000000280)=""/38, 0x26}, 0x10000) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3efd7ab4c41335d9, @perf_bp={0x0, 0xf}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_move_numa\x00', r1, 0x0, 0x200}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xe, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000440)='kfree\x00', r6, 0x0, 0xffffffffffff6326}, 0x18) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) 788.333952ms ago: executing program 2 (id=279): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1f000801}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@generic={0x0, r5}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x8000}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='qgroup_meta_reserve\x00', 0xffffffffffffffff, 0x0, 0x3eb}, 0x18) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r8 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r9 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000619b000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702faff07000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r10, 0x0, 0xe, 0x0, &(0x7f0000000380)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$sock_attach_bpf(r8, 0x84, 0x1f, &(0x7f0000000000), 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r8}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r7, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@phonet={0x23, 0x0, 0x0, 0x27}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x41, 0x102}}], 0x18}, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r11) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4000000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, r9}, 0x94) 713.63699ms ago: executing program 1 (id=280): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x11, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="5c00000013006bcd9e3fe3dceb48aa31086b8703110000001fc3000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x40) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r1, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000006000000180100006020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000035000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)=@generic={0x0}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30180, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x8000}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x88e}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$kcm(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0) close(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='qgroup_meta_reserve\x00', 0xffffffffffffffff, 0x0, 0x3eb}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x4, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r6 = socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000000000000000000619b000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702faff07000000b70300000000000085000000170000009500000000000000"], &(0x7f0000000040)='syzkaller\x00'}, 0x94) setsockopt$sock_attach_bpf(r6, 0x84, 0x1f, &(0x7f0000000000), 0x90) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={r6}) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r5, 0x26, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) sendmsg$sock(r1, &(0x7f00000000c0)={&(0x7f0000000040)=@phonet={0x23, 0x0, 0x0, 0x27}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@timestamping={{0x14, 0x1, 0x41, 0x102}}], 0x18}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r7) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000340)=ANY=[@ANYRESOCT=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b}, 0x94) 658.385585ms ago: executing program 0 (id=281): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='rpcb_setport\x00', r1, 0x0, 0x8}, 0x18) r2 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000280)={0x2, 0x10, @local}, 0x10, 0x0}, 0x8000000) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, 0x0) socket$kcm(0x29, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0x16, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r3, 0x10d, 0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x111026, 0x6, 0x6, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1000000, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x9, 0x4022, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x40000000000000, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x3, 0x9}, 0x0, 0x0, 0x89, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x70c551cb0a2f96bb) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 621.843489ms ago: executing program 3 (id=282): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) 83.848511ms ago: executing program 3 (id=283): bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0x0, 0x37, 0x1c}, 0xc) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xb, 0x0, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x20) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xa}, 0x104101, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0x1, 0x12) 0s ago: executing program 0 (id=284): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x114905, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1da}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller0\x00', @broadcast}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='8-N:0/N'], 0x6a) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000340)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000780)={&(0x7f0000000400)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x3, 0x4}}, 0x10, &(0x7f0000000640), 0x0, &(0x7f00000006c0)="84122b5336cfeed1d08262e7a18dd934130825bd34439965177b564cd942564779c43c68eaffe24829bcc25a1d2de7815cb23d250fd8a2a1404004765a73415bfc60158e313905894f46d1c8cb3e6736199032e5bb", 0x55, 0xc001}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000001c0)='map\x00', 0xffffffffffffffff, 0x0, 0x200}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffffffc}, 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x1f, 0x4, &(0x7f00000001c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) write$cgroup_devices(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="1e0308004d6b71ef288563"], 0xffdd) write$cgroup_devices(r0, &(0x7f0000000840)=ANY=[], 0xffdd) kernel console output (not intermixed with test programs): no interfaces have a carrier [ 51.971256][ T5453] 8021q: adding VLAN 0 to HW filter on device bond0 [ 51.983254][ T5453] eql: remember to turn off Van-Jacobson compression on your slave devices Starting crond: OK Starting sshd: OK syzkaller Warning: Permanently added '10.128.0.89' (ED25519) to the list of known hosts. syzkaller login: [ 72.875095][ T5777] cgroup: Unknown subsys name 'net' [ 73.042958][ T5777] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 74.686121][ T5777] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 76.612772][ T5791] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 76.631839][ T5791] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 76.642288][ T5801] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 76.665682][ T5801] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 76.667308][ T5796] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 76.681751][ T5796] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 76.684938][ T5801] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 76.697478][ T5801] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 76.705033][ T5803] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 76.706765][ T5801] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 76.716171][ T5791] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 76.727243][ T5803] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 76.735573][ T5801] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 76.735960][ T5791] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 76.743783][ T5801] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 76.750014][ T5803] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 76.757982][ T5801] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 76.765915][ T5791] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 76.773358][ T5801] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 76.779316][ T5791] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 76.785455][ T5801] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 76.792706][ T5791] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 76.800423][ T5103] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 76.813655][ T5801] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 77.175391][ T5793] chnl_net:caif_netlink_parms(): no params data found [ 77.372011][ T5793] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.379543][ T5793] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.387489][ T5793] bridge_slave_0: entered allmulticast mode [ 77.394978][ T5793] bridge_slave_0: entered promiscuous mode [ 77.425396][ T5787] chnl_net:caif_netlink_parms(): no params data found [ 77.448370][ T5793] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.455845][ T5793] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.463057][ T5793] bridge_slave_1: entered allmulticast mode [ 77.470426][ T5793] bridge_slave_1: entered promiscuous mode [ 77.569230][ T5793] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.590873][ T5788] chnl_net:caif_netlink_parms(): no params data found [ 77.612848][ T5793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.697571][ T5787] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.704916][ T5787] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.712300][ T5787] bridge_slave_0: entered allmulticast mode [ 77.720183][ T5787] bridge_slave_0: entered promiscuous mode [ 77.736666][ T5793] team0: Port device team_slave_0 added [ 77.742975][ T5798] chnl_net:caif_netlink_parms(): no params data found [ 77.758452][ T5787] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.765925][ T5787] bridge0: port 2(bridge_slave_1) entered disabled state [ 77.773113][ T5787] bridge_slave_1: entered allmulticast mode [ 77.780511][ T5787] bridge_slave_1: entered promiscuous mode [ 77.804696][ T5793] team0: Port device team_slave_1 added [ 77.883040][ T5787] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.896993][ T5787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.917722][ T5793] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 77.925067][ T5793] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 77.951470][ T5793] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 77.969090][ T5788] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.976685][ T5788] bridge0: port 1(bridge_slave_0) entered disabled state [ 77.983879][ T5788] bridge_slave_0: entered allmulticast mode [ 77.991038][ T5788] bridge_slave_0: entered promiscuous mode [ 78.009314][ T5793] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.016514][ T5793] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.042538][ T5793] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.060154][ T5788] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.067514][ T5788] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.074833][ T5788] bridge_slave_1: entered allmulticast mode [ 78.081897][ T5788] bridge_slave_1: entered promiscuous mode [ 78.108347][ T5787] team0: Port device team_slave_0 added [ 78.117308][ T5787] team0: Port device team_slave_1 added [ 78.209496][ T5788] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.219822][ T5787] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.227162][ T5787] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.253325][ T5787] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.266292][ T5787] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.273270][ T5787] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.299801][ T5787] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.311169][ T5798] bridge0: port 1(bridge_slave_0) entered blocking state [ 78.319850][ T5798] bridge0: port 1(bridge_slave_0) entered disabled state [ 78.327118][ T5798] bridge_slave_0: entered allmulticast mode [ 78.334053][ T5798] bridge_slave_0: entered promiscuous mode [ 78.343119][ T5788] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.394811][ T5798] bridge0: port 2(bridge_slave_1) entered blocking state [ 78.402014][ T5798] bridge0: port 2(bridge_slave_1) entered disabled state [ 78.409576][ T5798] bridge_slave_1: entered allmulticast mode [ 78.417114][ T5798] bridge_slave_1: entered promiscuous mode [ 78.440583][ T5793] hsr_slave_0: entered promiscuous mode [ 78.447663][ T5793] hsr_slave_1: entered promiscuous mode [ 78.485276][ T5788] team0: Port device team_slave_0 added [ 78.532854][ T5798] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.545980][ T5788] team0: Port device team_slave_1 added [ 78.553699][ T5798] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.572920][ T5787] hsr_slave_0: entered promiscuous mode [ 78.579650][ T5787] hsr_slave_1: entered promiscuous mode [ 78.588785][ T5787] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 78.596812][ T5787] Cannot create hsr debugfs directory [ 78.683248][ T5798] team0: Port device team_slave_0 added [ 78.693270][ T5798] team0: Port device team_slave_1 added [ 78.720673][ T5788] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.727801][ T5788] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.753810][ T5788] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.820079][ T5788] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.827271][ T5788] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.854576][ T5795] Bluetooth: hci3: command tx timeout [ 78.854595][ T5801] Bluetooth: hci1: command tx timeout [ 78.860304][ T5795] Bluetooth: hci0: command tx timeout [ 78.872124][ T5788] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 78.883988][ T5798] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 78.891424][ T5798] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.917444][ T5798] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 78.928236][ T5795] Bluetooth: hci2: command tx timeout [ 78.936251][ T5798] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 78.943226][ T5798] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 78.969255][ T5798] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 79.124005][ T5798] hsr_slave_0: entered promiscuous mode [ 79.130641][ T5798] hsr_slave_1: entered promiscuous mode [ 79.137310][ T5798] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 79.144982][ T5798] Cannot create hsr debugfs directory [ 79.168431][ T5788] hsr_slave_0: entered promiscuous mode [ 79.175498][ T5788] hsr_slave_1: entered promiscuous mode [ 79.181691][ T5788] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 79.189950][ T5788] Cannot create hsr debugfs directory [ 79.376658][ T5793] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.411374][ T5793] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.422926][ T5793] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.458307][ T5793] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.538015][ T5787] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 79.549791][ T5787] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 79.561167][ T5787] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 79.571366][ T5787] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 79.685582][ T5798] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 79.698099][ T5798] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 79.719908][ T5798] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 79.731385][ T5798] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 79.827882][ T5788] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.838750][ T5788] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.852609][ T5788] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.863440][ T5788] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.902593][ T5793] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.998290][ T5793] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.019374][ T5798] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.039887][ T5787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.070329][ T1089] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.077862][ T1089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.091548][ T1089] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.098760][ T1089] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.115299][ T5787] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.152959][ T1080] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.160161][ T1080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.190013][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.197217][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.213101][ T5798] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.272461][ T58] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.279695][ T58] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.301265][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.308480][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.399617][ T5788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.437026][ T5788] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.496873][ T1089] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.504165][ T1089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 80.546341][ T11] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.553537][ T11] bridge0: port 2(bridge_slave_1) entered forwarding state [ 80.829324][ T5793] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.893081][ T5787] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 80.925582][ T5795] Bluetooth: hci0: command tx timeout [ 80.931080][ T5795] Bluetooth: hci1: command tx timeout [ 80.934211][ T5801] Bluetooth: hci3: command tx timeout [ 81.007666][ T5801] Bluetooth: hci2: command tx timeout [ 81.041830][ T5793] veth0_vlan: entered promiscuous mode [ 81.070758][ T5787] veth0_vlan: entered promiscuous mode [ 81.096329][ T5787] veth1_vlan: entered promiscuous mode [ 81.106571][ T5798] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.118318][ T5793] veth1_vlan: entered promiscuous mode [ 81.142744][ T5788] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 81.222411][ T5787] veth0_macvtap: entered promiscuous mode [ 81.256767][ T5787] veth1_macvtap: entered promiscuous mode [ 81.284033][ T5798] veth0_vlan: entered promiscuous mode [ 81.292238][ T5793] veth0_macvtap: entered promiscuous mode [ 81.303783][ T5793] veth1_macvtap: entered promiscuous mode [ 81.333572][ T5788] veth0_vlan: entered promiscuous mode [ 81.342934][ T5798] veth1_vlan: entered promiscuous mode [ 81.359215][ T5787] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.372578][ T5787] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.396418][ T5793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.409502][ T5793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.421158][ T5793] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.431604][ T5788] veth1_vlan: entered promiscuous mode [ 81.446758][ T5793] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 81.457662][ T5793] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.470046][ T5793] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.478933][ T5787] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.488432][ T5787] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.498377][ T5787] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.507432][ T5787] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.528755][ T5793] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.537728][ T5793] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.547335][ T5793] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.559628][ T5793] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.629780][ T5798] veth0_macvtap: entered promiscuous mode [ 81.641896][ T5798] veth1_macvtap: entered promiscuous mode [ 81.690561][ T5788] veth0_macvtap: entered promiscuous mode [ 81.729081][ T5798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.740807][ T5798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.751881][ T5798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.762852][ T5798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.776087][ T5798] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 81.796463][ T5788] veth1_macvtap: entered promiscuous mode [ 81.824535][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 81.832577][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 81.900231][ T5798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 81.910987][ T5798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.929176][ T5798] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 81.941391][ T5798] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.956054][ T5798] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 81.965548][ T5788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.977175][ T5788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 81.988789][ T5788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 81.999699][ T5788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.009922][ T5788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 82.020641][ T5788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.033071][ T5788] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 82.045936][ T5788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 82.063589][ T5788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.073972][ T5788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 82.085216][ T5788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.096005][ T5788] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 82.106768][ T5788] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 82.119285][ T5788] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 82.129284][ T1089] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.153605][ T1089] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.170163][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.183704][ T5798] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.184418][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.197784][ T5798] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.217006][ T5798] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.227122][ T5798] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.297562][ T5788] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.312653][ T5788] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.325662][ T5788] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.334672][ T5788] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.365854][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.384161][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.661292][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 82.686779][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 82.790218][ T5877] netlink: 'syz.0.1': attribute type 10 has an invalid length. [ 82.800954][ T5877] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1'. [ 82.810205][ T5877] dummy0: entered promiscuous mode [ 82.816868][ T5877] dummy0: entered allmulticast mode [ 82.823364][ T5877] bridge0: port 3(dummy0) entered blocking state [ 82.830477][ T5877] bridge0: port 3(dummy0) entered disabled state [ 82.851711][ T5877] bridge0: port 3(dummy0) entered blocking state [ 82.858511][ T5877] bridge0: port 3(dummy0) entered forwarding state [ 82.879495][ C0] hrtimer: interrupt took 58147 ns [ 83.004550][ T5103] Bluetooth: hci0: command tx timeout [ 83.010123][ T5801] Bluetooth: hci1: command tx timeout [ 83.017073][ T5103] Bluetooth: hci3: command tx timeout [ 83.054583][ T1089] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.062561][ T1089] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.086271][ T5801] Bluetooth: hci2: command tx timeout [ 83.110106][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.130625][ T5886] netlink: 'syz.2.2': attribute type 12 has an invalid length. [ 83.138569][ T5886] netlink: 132 bytes leftover after parsing attributes in process `syz.2.2'. [ 83.184453][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.224630][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 83.232519][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 83.609913][ T5893] netlink: 'syz.3.4': attribute type 10 has an invalid length. [ 83.621172][ T5893] netlink: 40 bytes leftover after parsing attributes in process `syz.3.4'. [ 83.647623][ T5883] syz.2.2 (5883) used greatest stack depth: 20520 bytes left [ 83.684223][ T5893] dummy0: entered promiscuous mode [ 83.689427][ T5893] dummy0: entered allmulticast mode [ 83.746799][ T5893] bridge0: port 3(dummy0) entered blocking state [ 83.753441][ T5893] bridge0: port 3(dummy0) entered disabled state [ 83.779747][ T5893] bridge0: port 3(dummy0) entered blocking state [ 83.786443][ T5893] bridge0: port 3(dummy0) entered forwarding state [ 83.806661][ T5901] netlink: 'syz.0.5': attribute type 10 has an invalid length. [ 83.820637][ T5901] netlink: 40 bytes leftover after parsing attributes in process `syz.0.5'. [ 84.026366][ T5903] syzkaller0: entered promiscuous mode [ 84.032245][ T5903] syzkaller0: entered allmulticast mode [ 85.114924][ T5801] Bluetooth: hci1: command tx timeout [ 85.120462][ T5801] Bluetooth: hci3: command tx timeout [ 85.126744][ T5103] Bluetooth: hci0: command tx timeout [ 85.164397][ T5801] Bluetooth: hci2: command tx timeout [ 86.977833][ T1188] cfg80211: failed to load regulatory.db [ 87.902792][ T5921] netlink: 'syz.0.9': attribute type 10 has an invalid length. [ 87.911750][ T5921] netlink: 40 bytes leftover after parsing attributes in process `syz.0.9'. [ 88.105722][ T5929] netlink: 'syz.3.11': attribute type 10 has an invalid length. [ 88.117450][ T5929] netlink: 40 bytes leftover after parsing attributes in process `syz.3.11'. [ 88.292025][ T5931] syzkaller0: entered promiscuous mode [ 88.299426][ T5931] syzkaller0: entered allmulticast mode [ 88.331004][ T5937] netlink: 'syz.0.13': attribute type 10 has an invalid length. [ 88.356436][ T5937] bridge0: port 3(dummy0) entered disabled state [ 88.376177][ T5937] dummy0: left allmulticast mode [ 88.381195][ T5937] dummy0: left promiscuous mode [ 88.386909][ T5937] bridge0: port 3(dummy0) entered disabled state [ 88.401801][ T5937] team0: Port device dummy0 added [ 88.799054][ T5941] Illegal XDP return value 4294967274 on prog (id 14) dev N/A, expect packet loss! [ 89.939004][ T5939] netlink: 'syz.0.14': attribute type 10 has an invalid length. [ 89.946925][ T5939] netlink: 40 bytes leftover after parsing attributes in process `syz.0.14'. [ 89.956270][ T5939] dummy0: entered promiscuous mode [ 89.961449][ T5939] dummy0: entered allmulticast mode [ 89.980604][ T5939] team0: Port device dummy0 removed [ 89.986779][ T5939] bridge0: port 3(dummy0) entered blocking state [ 89.993301][ T5939] bridge0: port 3(dummy0) entered disabled state [ 90.012534][ T5947] netlink: 'syz.3.16': attribute type 10 has an invalid length. [ 90.034376][ T5947] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16'. [ 90.187107][ T5952] netlink: 'syz.2.17': attribute type 10 has an invalid length. [ 90.628707][ T5952] team0: Port device wlan1 added [ 90.644271][ T5954] netlink: 'syz.0.18': attribute type 10 has an invalid length. [ 90.652107][ T5954] netlink: 40 bytes leftover after parsing attributes in process `syz.0.18'. [ 90.672915][ T5954] bridge0: port 3(dummy0) entered blocking state [ 90.679474][ T5954] bridge0: port 3(dummy0) entered forwarding state [ 90.757716][ T5952] syz.2.17 (5952) used greatest stack depth: 18472 bytes left [ 90.858319][ T5965] syzkaller0: entered promiscuous mode [ 90.866485][ T5965] syzkaller0: entered allmulticast mode [ 92.325678][ T5971] netlink: 'syz.2.23': attribute type 2 has an invalid length. [ 92.348232][ T5975] team0: Port device team_slave_0 removed [ 92.359010][ T5975] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 92.379041][ T5978] netlink: 'syz.0.25': attribute type 10 has an invalid length. [ 92.401660][ T5978] bridge0: port 3(dummy0) entered disabled state [ 92.425117][ T5978] dummy0: left allmulticast mode [ 92.430148][ T5978] dummy0: left promiscuous mode [ 92.441094][ T5978] bridge0: port 3(dummy0) entered disabled state [ 92.459163][ T5978] team0: Port device dummy0 added [ 92.563071][ T5980] syzkaller0: entered promiscuous mode [ 92.569083][ T5980] syzkaller0: entered allmulticast mode [ 92.589373][ T5983] netlink: 'syz.2.27': attribute type 10 has an invalid length. [ 92.598652][ T5983] netlink: 40 bytes leftover after parsing attributes in process `syz.2.27'. [ 92.608753][ T5983] dummy0: entered promiscuous mode [ 92.614493][ T5983] dummy0: entered allmulticast mode [ 92.620881][ T5983] bridge0: port 3(dummy0) entered blocking state [ 92.628938][ T5983] bridge0: port 3(dummy0) entered disabled state [ 92.639059][ T5983] bridge0: port 3(dummy0) entered blocking state [ 92.645583][ T5983] bridge0: port 3(dummy0) entered forwarding state [ 94.187928][ T5989] syzkaller0: entered promiscuous mode [ 94.193511][ T5989] syzkaller0: entered allmulticast mode [ 94.247006][ T5992] netlink: 'syz.3.28': attribute type 10 has an invalid length. [ 94.279472][ T5992] netlink: 40 bytes leftover after parsing attributes in process `syz.3.28'. [ 95.960094][ T6002] netlink: 'syz.1.32': attribute type 10 has an invalid length. [ 95.968046][ T6002] netlink: 40 bytes leftover after parsing attributes in process `syz.1.32'. [ 95.977106][ T6002] dummy0: entered promiscuous mode [ 95.982309][ T6002] dummy0: entered allmulticast mode [ 95.988542][ T6002] bridge0: port 3(dummy0) entered blocking state [ 95.996200][ T6002] bridge0: port 3(dummy0) entered disabled state [ 96.004404][ T6002] bridge0: port 3(dummy0) entered blocking state [ 96.010844][ T6002] bridge0: port 3(dummy0) entered forwarding state [ 96.020991][ T6004] netlink: 'syz.2.33': attribute type 10 has an invalid length. [ 96.029062][ T6004] netlink: 40 bytes leftover after parsing attributes in process `syz.2.33'. [ 96.170729][ T6016] syzkaller0: entered promiscuous mode [ 96.176559][ T6016] syzkaller0: entered allmulticast mode [ 97.577898][ T6026] netlink: 'syz.0.35': attribute type 2 has an invalid length. [ 97.587507][ T6025] netlink: 'syz.2.37': attribute type 10 has an invalid length. [ 97.595270][ T6025] netlink: 40 bytes leftover after parsing attributes in process `syz.2.37'. [ 97.623224][ T6033] team0: Port device team_slave_0 removed [ 97.651587][ T6033] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 97.788208][ T6041] netlink: 'syz.0.41': attribute type 10 has an invalid length. [ 99.107988][ T6049] syzkaller0: entered promiscuous mode [ 99.144628][ T6049] syzkaller0: entered allmulticast mode [ 100.893987][ T6059] netlink: 'syz.1.47': attribute type 10 has an invalid length. [ 100.901976][ T6059] netlink: 40 bytes leftover after parsing attributes in process `syz.1.47'. [ 100.974944][ T6057] syzkaller0: entered promiscuous mode [ 100.980494][ T6057] syzkaller0: entered allmulticast mode [ 102.528683][ T6071] netlink: 'syz.1.50': attribute type 2 has an invalid length. [ 102.542405][ T6073] netlink: 'syz.0.49': attribute type 10 has an invalid length. [ 102.553422][ T6073] netlink: 40 bytes leftover after parsing attributes in process `syz.0.49'. [ 102.562498][ T6073] dummy0: entered promiscuous mode [ 102.567858][ T6073] dummy0: entered allmulticast mode [ 102.585505][ T6073] team0: Port device dummy0 removed [ 102.591365][ T6073] bridge0: port 3(dummy0) entered blocking state [ 102.607829][ T6073] bridge0: port 3(dummy0) entered disabled state [ 102.653556][ T6075] team0: Port device team_slave_0 removed [ 102.660235][ T6075] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 103.020827][ T6084] netlink: 'syz.2.54': attribute type 10 has an invalid length. [ 103.157432][ T6084] bridge0: port 3(dummy0) entered disabled state [ 103.231711][ T6084] dummy0: left allmulticast mode [ 103.241685][ T6084] dummy0: left promiscuous mode [ 103.256915][ T6084] bridge0: port 3(dummy0) entered disabled state [ 103.709033][ T6084] team0: Port device dummy0 added [ 103.848223][ T6084] syz.2.54 (6084) used greatest stack depth: 18152 bytes left [ 103.968747][ T6093] syzkaller0: entered promiscuous mode [ 103.980434][ T6093] syzkaller0: entered allmulticast mode [ 103.990107][ T6098] netlink: 'syz.0.57': attribute type 10 has an invalid length. [ 104.008574][ T6098] netlink: 40 bytes leftover after parsing attributes in process `syz.0.57'. [ 104.023657][ T6098] bridge0: port 3(dummy0) entered blocking state [ 104.030279][ T6098] bridge0: port 3(dummy0) entered forwarding state [ 105.543373][ T6103] netlink: 'syz.1.59': attribute type 10 has an invalid length. [ 105.551251][ T6103] netlink: 40 bytes leftover after parsing attributes in process `syz.1.59'. [ 105.626368][ T6110] syzkaller0: entered promiscuous mode [ 105.631922][ T6110] syzkaller0: entered allmulticast mode [ 106.921028][ T6120] netlink: 'syz.1.61': attribute type 2 has an invalid length. [ 106.929577][ T6122] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 107.785305][ T6131] netlink: 'syz.3.66': attribute type 10 has an invalid length. [ 107.822633][ T6131] netlink: 40 bytes leftover after parsing attributes in process `syz.3.66'. [ 108.117399][ T6135] netlink: 'syz.1.67': attribute type 10 has an invalid length. [ 108.239486][ T6135] bridge0: port 3(dummy0) entered disabled state [ 108.292140][ T6135] dummy0: left allmulticast mode [ 108.308021][ T6135] dummy0: left promiscuous mode [ 108.334328][ T6135] bridge0: port 3(dummy0) entered disabled state [ 108.511308][ T6135] team0: Port device dummy0 added [ 108.921252][ T6135] syz.1.67 (6135) used greatest stack depth: 17800 bytes left [ 109.072631][ T6142] netlink: 'syz.1.69': attribute type 10 has an invalid length. [ 109.081072][ T6142] netlink: 40 bytes leftover after parsing attributes in process `syz.1.69'. [ 109.090883][ T6142] dummy0: entered promiscuous mode [ 109.097173][ T6142] dummy0: entered allmulticast mode [ 109.159228][ T6142] team0: Port device dummy0 removed [ 109.168663][ T6142] bridge0: port 3(dummy0) entered blocking state [ 109.186034][ T6142] bridge0: port 3(dummy0) entered disabled state [ 109.195302][ T6145] netlink: 'syz.3.70': attribute type 10 has an invalid length. [ 109.204777][ T6145] netlink: 40 bytes leftover after parsing attributes in process `syz.3.70'. [ 109.229946][ T6148] netlink: 'syz.2.71': attribute type 2 has an invalid length. [ 109.241366][ T6148] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 109.420728][ T6155] syzkaller0: entered promiscuous mode [ 109.434388][ T6155] syzkaller0: entered allmulticast mode [ 111.002361][ T6159] syzkaller0: entered promiscuous mode [ 111.008134][ T6159] syzkaller0: entered allmulticast mode [ 111.090838][ T6168] netlink: 'syz.3.77': attribute type 10 has an invalid length. [ 111.100573][ T6168] netlink: 40 bytes leftover after parsing attributes in process `syz.3.77'. [ 111.117582][ T6173] netlink: 'syz.1.78': attribute type 10 has an invalid length. [ 111.126738][ T6173] dummy0: left allmulticast mode [ 111.131892][ T6173] dummy0: left promiscuous mode [ 111.141754][ T6173] bridge0: port 3(dummy0) entered disabled state [ 111.240104][ T6173] team0: Port device dummy0 added [ 113.148529][ T6175] netlink: 'syz.3.79': attribute type 10 has an invalid length. [ 113.156872][ T6175] netlink: 40 bytes leftover after parsing attributes in process `syz.3.79'. [ 113.269065][ T6184] netlink: 'syz.3.81': attribute type 10 has an invalid length. [ 113.278704][ T6184] netlink: 40 bytes leftover after parsing attributes in process `syz.3.81'. [ 113.371405][ T6186] netlink: 'syz.2.82': attribute type 2 has an invalid length. [ 113.393292][ T6186] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 113.714936][ T6197] netlink: 'syz.3.86': attribute type 10 has an invalid length. [ 113.738646][ T6197] netlink: 40 bytes leftover after parsing attributes in process `syz.3.86'. [ 113.883434][ T6198] syzkaller0: entered promiscuous mode [ 113.894826][ T6198] syzkaller0: entered allmulticast mode [ 113.913415][ T6200] netlink: 'syz.1.88': attribute type 10 has an invalid length. [ 113.923841][ T6200] netlink: 40 bytes leftover after parsing attributes in process `syz.1.88'. [ 113.938570][ T6200] dummy0: entered promiscuous mode [ 113.943928][ T6200] dummy0: entered allmulticast mode [ 113.974378][ T6200] team0: Port device dummy0 removed [ 113.984392][ T6200] bridge0: port 3(dummy0) entered blocking state [ 113.991136][ T6200] bridge0: port 3(dummy0) entered disabled state [ 116.009177][ T6215] netlink: 'syz.1.91': attribute type 10 has an invalid length. [ 116.024661][ T6215] netlink: 40 bytes leftover after parsing attributes in process `syz.1.91'. [ 116.058604][ T6215] bridge0: port 3(dummy0) entered blocking state [ 116.065279][ T6215] bridge0: port 3(dummy0) entered forwarding state [ 116.130686][ T6228] netlink: 'syz.2.93': attribute type 10 has an invalid length. [ 116.159666][ T6228] netlink: 40 bytes leftover after parsing attributes in process `syz.2.93'. [ 116.180050][ T6228] dummy0: entered promiscuous mode [ 116.190234][ T6228] dummy0: entered allmulticast mode [ 116.255681][ T6228] team0: Port device dummy0 removed [ 116.261909][ T6228] bridge0: port 3(dummy0) entered blocking state [ 116.312923][ T6228] bridge0: port 3(dummy0) entered disabled state [ 116.402286][ T6239] netlink: 'syz.3.96': attribute type 2 has an invalid length. [ 116.510268][ T6239] team0: Port device team_slave_0 removed [ 116.524126][ T6239] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 116.813341][ T6247] netlink: 'syz.3.100': attribute type 10 has an invalid length. [ 116.840384][ T6247] netlink: 40 bytes leftover after parsing attributes in process `syz.3.100'. [ 116.881022][ T6249] netlink: 132 bytes leftover after parsing attributes in process `syz.0.101'. [ 117.163450][ T6254] netlink: 'syz.2.103': attribute type 10 has an invalid length. [ 117.180520][ T6254] netlink: 40 bytes leftover after parsing attributes in process `syz.2.103'. [ 117.194087][ T6254] bridge0: port 3(dummy0) entered blocking state [ 117.200684][ T6254] bridge0: port 3(dummy0) entered forwarding state [ 117.383558][ T6255] syzkaller0: entered promiscuous mode [ 117.394024][ T6255] syzkaller0: entered allmulticast mode [ 120.134505][ T6275] netlink: 'syz.2.109': attribute type 2 has an invalid length. [ 120.142823][ T6278] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 120.162222][ T6279] netlink: 'syz.3.111': attribute type 10 has an invalid length. [ 120.172730][ T6279] netlink: 40 bytes leftover after parsing attributes in process `syz.3.111'. [ 120.305943][ T6285] netlink: 14 bytes leftover after parsing attributes in process `syz.0.112'. [ 120.337237][ T6285] hsr_slave_0: left promiscuous mode [ 120.345416][ T6285] hsr_slave_1: left promiscuous mode [ 120.430333][ T6287] IPv6: Can't replace route, no match found [ 120.448322][ T6291] netlink: 'syz.2.115': attribute type 10 has an invalid length. [ 120.477380][ T6291] netlink: 40 bytes leftover after parsing attributes in process `syz.2.115'. [ 120.956509][ T6301] netlink: 'syz.0.119': attribute type 10 has an invalid length. [ 121.010440][ T6301] bridge0: port 3(dummy0) entered disabled state [ 121.035298][ T6301] dummy0: left allmulticast mode [ 121.040787][ T6301] dummy0: left promiscuous mode [ 121.055644][ T6301] bridge0: port 3(dummy0) entered disabled state [ 121.125230][ T6301] team0: Port device dummy0 added [ 121.279941][ T6306] syzkaller0: entered promiscuous mode [ 121.293169][ T6306] syzkaller0: entered allmulticast mode [ 121.329781][ T6311] netlink: 'syz.1.123': attribute type 2 has an invalid length. [ 121.339354][ T6309] netlink: 'syz.0.122': attribute type 10 has an invalid length. [ 121.350252][ T6309] netlink: 40 bytes leftover after parsing attributes in process `syz.0.122'. [ 121.359728][ T6309] dummy0: entered promiscuous mode [ 121.365102][ T6309] dummy0: entered allmulticast mode [ 121.387311][ T6309] team0: Port device dummy0 removed [ 121.411860][ T6309] bridge0: port 3(dummy0) entered blocking state [ 121.441469][ T6309] bridge0: port 3(dummy0) entered disabled state [ 123.412839][ T6314] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 123.430294][ T6317] netlink: 132 bytes leftover after parsing attributes in process `syz.0.125'. [ 123.444051][ T6317] FAULT_INJECTION: forcing a failure. [ 123.444051][ T6317] name failslab, interval 1, probability 0, space 0, times 1 [ 123.461871][ T6317] CPU: 0 PID: 6317 Comm: syz.0.125 Not tainted syzkaller #0 [ 123.469327][ T6317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 123.479451][ T6317] Call Trace: [ 123.482766][ T6317] [ 123.485746][ T6317] dump_stack_lvl+0x16c/0x230 [ 123.490487][ T6317] ? show_regs_print_info+0x20/0x20 [ 123.495756][ T6317] ? load_image+0x3b0/0x3b0 [ 123.500316][ T6317] ? verify_lock_unused+0x140/0x140 [ 123.505565][ T6317] ? perf_trace_lock+0xf7/0x380 [ 123.510487][ T6317] should_fail_ex+0x39d/0x4d0 [ 123.515226][ T6317] should_failslab+0x9/0x20 [ 123.519776][ T6317] slab_pre_alloc_hook+0x59/0x310 [ 123.524863][ T6317] kmem_cache_alloc+0x5a/0x2e0 [ 123.529692][ T6317] ? skb_clone+0x1eb/0x370 [ 123.534196][ T6317] skb_clone+0x1eb/0x370 [ 123.538503][ T6317] __netlink_deliver_tap+0x41c/0x830 [ 123.543846][ T6317] ? netlink_deliver_tap+0x2e/0x1b0 [ 123.549065][ T6317] netlink_deliver_tap+0x19c/0x1b0 [ 123.554198][ T6317] netlink_sendskb+0x68/0x130 [ 123.558907][ T6317] netlink_ack+0xc7e/0x1110 [ 123.563419][ T6317] ? __bpf_trace_bpf_trace_printk+0x100/0x100 [ 123.569513][ T6317] ? netlink_dump+0xde0/0xde0 [ 123.574212][ T6317] ? perf_trace_lock+0x2ed/0x380 [ 123.579180][ T6317] ? __copy_skb_header+0xa7/0x550 [ 123.584239][ T6317] netlink_rcv_skb+0x29a/0x480 [ 123.589043][ T6317] ? rtnetlink_bind+0x80/0x80 [ 123.593770][ T6317] ? netlink_ack+0x1110/0x1110 [ 123.598561][ T6317] ? __lock_acquire+0x7c80/0x7c80 [ 123.603600][ T6317] ? netlink_deliver_tap+0x2e/0x1b0 [ 123.609000][ T6317] netlink_unicast+0x751/0x8d0 [ 123.613792][ T6317] netlink_sendmsg+0x8c1/0xbe0 [ 123.618580][ T6317] ? netlink_getsockopt+0x580/0x580 [ 123.623794][ T6317] ? aa_sock_msg_perm+0x94/0x150 [ 123.628767][ T6317] ? bpf_lsm_socket_sendmsg+0x9/0x10 [ 123.634073][ T6317] ? security_socket_sendmsg+0x80/0xa0 [ 123.639557][ T6317] ? netlink_getsockopt+0x580/0x580 [ 123.644826][ T6317] ____sys_sendmsg+0x5bf/0x950 [ 123.649624][ T6317] ? __asan_memset+0x22/0x40 [ 123.654241][ T6317] ? __sys_sendmsg_sock+0x30/0x30 [ 123.659306][ T6317] ? __import_iovec+0x5f2/0x860 [ 123.664186][ T6317] ? import_iovec+0x73/0xa0 [ 123.668705][ T6317] ___sys_sendmsg+0x220/0x290 [ 123.673402][ T6317] ? __sys_sendmsg+0x270/0x270 [ 123.678203][ T6317] ? __lock_acquire+0x7c80/0x7c80 [ 123.683256][ T6317] __se_sys_sendmsg+0x1a5/0x270 [ 123.688126][ T6317] ? __x64_sys_sendmsg+0x80/0x80 [ 123.693087][ T6317] ? lockdep_hardirqs_on+0x98/0x150 [ 123.698318][ T6317] do_syscall_64+0x55/0xb0 [ 123.702747][ T6317] ? clear_bhb_loop+0x40/0x90 [ 123.707488][ T6317] ? clear_bhb_loop+0x40/0x90 [ 123.712195][ T6317] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 123.718106][ T6317] RIP: 0033:0x7fdfdb18eec9 [ 123.722569][ T6317] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.742277][ T6317] RSP: 002b:00007fdfdc05b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 123.750717][ T6317] RAX: ffffffffffffffda RBX: 00007fdfdb3e5fa0 RCX: 00007fdfdb18eec9 [ 123.758733][ T6317] RDX: 0000000008000800 RSI: 0000200000000940 RDI: 0000000000000005 [ 123.766732][ T6317] RBP: 00007fdfdc05b090 R08: 0000000000000000 R09: 0000000000000000 [ 123.774713][ T6317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.782879][ T6317] R13: 00007fdfdb3e6038 R14: 00007fdfdb3e5fa0 R15: 00007ffdd4c1a9c8 [ 123.790875][ T6317] [ 124.081195][ T6332] netlink: 'syz.3.131': attribute type 10 has an invalid length. [ 124.170228][ T6332] bridge0: port 3(dummy0) entered disabled state [ 124.209891][ T6332] dummy0: left allmulticast mode [ 124.219311][ T6332] dummy0: left promiscuous mode [ 124.228729][ T6332] bridge0: port 3(dummy0) entered disabled state [ 124.301068][ T6332] team0: Port device dummy0 added [ 124.421643][ T6342] syzkaller0: entered promiscuous mode [ 124.430431][ T6342] syzkaller0: entered allmulticast mode [ 124.446898][ T6345] netlink: 'syz.3.135': attribute type 10 has an invalid length. [ 124.461555][ T6345] netlink: 40 bytes leftover after parsing attributes in process `syz.3.135'. [ 124.472495][ T6345] dummy0: entered promiscuous mode [ 124.478006][ T6345] dummy0: entered allmulticast mode [ 124.509006][ T6345] team0: Port device dummy0 removed [ 124.519508][ T6345] bridge0: port 3(dummy0) entered blocking state [ 124.531709][ T6345] bridge0: port 3(dummy0) entered disabled state [ 128.799397][ T6348] netlink: 'syz.2.136': attribute type 21 has an invalid length. [ 128.807240][ T6348] netlink: 164 bytes leftover after parsing attributes in process `syz.2.136'. [ 128.832453][ T6361] netlink: 'syz.3.137': attribute type 2 has an invalid length. [ 128.853220][ T6362] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 128.950850][ T6365] netlink: 132 bytes leftover after parsing attributes in process `syz.1.140'. [ 129.296432][ T6377] netlink: 'syz.2.145': attribute type 10 has an invalid length. [ 129.312181][ T6377] netlink: 40 bytes leftover after parsing attributes in process `syz.2.145'. [ 129.353267][ T6379] netlink: 'syz.0.146': attribute type 10 has an invalid length. [ 129.363731][ T6379] dummy0: left allmulticast mode [ 129.377923][ T6379] dummy0: left promiscuous mode [ 129.386181][ T6379] bridge0: port 3(dummy0) entered disabled state [ 129.498199][ T6379] team0: Port device dummy0 added [ 129.606414][ T6387] netlink: 64859 bytes leftover after parsing attributes in process `syz.2.148'. [ 129.803921][ T6393] syzkaller0: entered promiscuous mode [ 129.824418][ T6393] syzkaller0: entered allmulticast mode [ 129.863184][ T6399] netlink: 'syz.3.150': attribute type 2 has an invalid length. [ 129.883562][ T6395] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 132.793975][ T6413] netlink: 'syz.1.157': attribute type 10 has an invalid length. [ 132.802602][ T6413] netlink: 40 bytes leftover after parsing attributes in process `syz.1.157'. [ 132.972247][ T6418] netlink: 'syz.0.158': attribute type 10 has an invalid length. [ 133.017854][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.026617][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 133.085260][ T6422] netlink: 'syz.3.160': attribute type 10 has an invalid length. [ 133.093125][ T6422] netlink: 40 bytes leftover after parsing attributes in process `syz.3.160'. [ 133.105353][ T6422] bridge0: port 3(dummy0) entered blocking state [ 133.111943][ T6422] bridge0: port 3(dummy0) entered forwarding state [ 133.124382][ T6425] netlink: 176 bytes leftover after parsing attributes in process `syz.1.161'. [ 133.602266][ T6442] syzkaller0: entered promiscuous mode [ 133.609304][ T6442] syzkaller0: entered allmulticast mode [ 135.681263][ T6444] netlink: 'syz.1.168': attribute type 2 has an invalid length. [ 135.691168][ T6449] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 135.707695][ T6451] netlink: 'syz.3.170': attribute type 10 has an invalid length. [ 135.723579][ T6451] netlink: 40 bytes leftover after parsing attributes in process `syz.3.170'. [ 135.924093][ T6458] netlink: 'syz.2.171': attribute type 10 has an invalid length. [ 135.943907][ T6460] Zero length message leads to an empty skb [ 135.995044][ T6458] bridge0: port 3(dummy0) entered disabled state [ 136.010890][ T6458] dummy0: left allmulticast mode [ 136.021467][ T6458] dummy0: left promiscuous mode [ 136.029340][ T6458] bridge0: port 3(dummy0) entered disabled state [ 136.182575][ T6458] team0: Port device dummy0 added [ 137.408908][ T6484] netlink: 'syz.1.179': attribute type 10 has an invalid length. [ 137.422113][ T6484] netlink: 40 bytes leftover after parsing attributes in process `syz.1.179'. [ 137.445387][ T6486] netlink: 'syz.0.181': attribute type 10 has an invalid length. [ 137.454398][ T6486] netlink: 40 bytes leftover after parsing attributes in process `syz.0.181'. [ 137.463655][ T6486] dummy0: entered promiscuous mode [ 137.472208][ T6486] dummy0: entered allmulticast mode [ 137.493898][ T6486] team0: Port device dummy0 removed [ 137.508054][ T6486] bridge0: port 3(dummy0) entered blocking state [ 137.519979][ T6486] bridge0: port 3(dummy0) entered disabled state [ 137.595828][ T6489] syzkaller0: entered promiscuous mode [ 137.601369][ T6489] syzkaller0: entered allmulticast mode [ 139.437365][ T6494] netlink: 'syz.1.182': attribute type 2 has an invalid length. [ 139.461438][ T6496] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 139.583940][ T6502] netlink: 'syz.1.185': attribute type 7 has an invalid length. [ 139.679167][ T6505] netlink: 'syz.0.186': attribute type 10 has an invalid length. [ 139.696887][ T6505] dummy0: left allmulticast mode [ 139.702233][ T6505] dummy0: left promiscuous mode [ 139.731073][ T6505] bridge0: port 3(dummy0) entered disabled state [ 139.742925][ T6507] FAULT_INJECTION: forcing a failure. [ 139.742925][ T6507] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 139.772081][ T6507] CPU: 0 PID: 6507 Comm: syz.1.187 Not tainted syzkaller #0 [ 139.779473][ T6507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 139.789564][ T6507] Call Trace: [ 139.792877][ T6507] [ 139.795841][ T6507] dump_stack_lvl+0x16c/0x230 [ 139.800566][ T6507] ? show_regs_print_info+0x20/0x20 [ 139.805805][ T6507] ? load_image+0x3b0/0x3b0 [ 139.810347][ T6507] ? __might_fault+0xaa/0x120 [ 139.815074][ T6507] ? __lock_acquire+0x7c80/0x7c80 [ 139.820145][ T6507] should_fail_ex+0x39d/0x4d0 [ 139.824884][ T6507] _copy_from_user+0x2f/0xe0 [ 139.829510][ T6507] __sys_bpf+0x1e9/0x800 [ 139.833788][ T6507] ? bpf_link_show_fdinfo+0x350/0x350 [ 139.839221][ T6507] ? asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 139.845432][ T6507] __x64_sys_bpf+0x7c/0x90 [ 139.849885][ T6507] do_syscall_64+0x55/0xb0 [ 139.851617][ T6505] team0: Port device dummy0 added [ 139.854319][ T6507] ? clear_bhb_loop+0x40/0x90 [ 139.854343][ T6507] ? clear_bhb_loop+0x40/0x90 [ 139.854363][ T6507] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 139.854382][ T6507] RIP: 0033:0x7f5ff2f8eec9 [ 139.854399][ T6507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 139.854414][ T6507] RSP: 002b:00007f5ff3d50038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 139.854435][ T6507] RAX: ffffffffffffffda RBX: 00007f5ff31e5fa0 RCX: 00007f5ff2f8eec9 [ 139.854449][ T6507] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 139.854461][ T6507] RBP: 00007f5ff3d50090 R08: 0000000000000000 R09: 0000000000000000 [ 139.854473][ T6507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 139.854484][ T6507] R13: 00007f5ff31e6038 R14: 00007f5ff31e5fa0 R15: 00007ffdb4d30778 [ 139.947142][ T6507] [ 140.244559][ T6519] netlink: 'syz.3.191': attribute type 10 has an invalid length. [ 140.253046][ T6519] netlink: 40 bytes leftover after parsing attributes in process `syz.3.191'. [ 140.316881][ T6521] netlink: 'syz.0.192': attribute type 10 has an invalid length. [ 140.330247][ T6521] netlink: 40 bytes leftover after parsing attributes in process `syz.0.192'. [ 140.340833][ T6521] dummy0: entered promiscuous mode [ 140.346202][ T6521] dummy0: entered allmulticast mode [ 140.368045][ T6521] team0: Port device dummy0 removed [ 140.389605][ T6521] bridge0: port 3(dummy0) entered blocking state [ 140.405636][ T6521] bridge0: port 3(dummy0) entered disabled state [ 140.417761][ T6523] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 140.509015][ T6529] syzkaller0: entered promiscuous mode [ 140.529488][ T6529] syzkaller0: entered allmulticast mode [ 147.125721][ T6548] pim6reg: tun_chr_ioctl cmd 1074812118 [ 147.375088][ T6556] validate_nla: 1 callbacks suppressed [ 147.375150][ T6556] netlink: 'syz.2.200': attribute type 10 has an invalid length. [ 147.585650][ T6564] netlink: 'syz.3.204': attribute type 2 has an invalid length. [ 147.619361][ T6564] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 147.680532][ T6568] netlink: 'syz.2.205': attribute type 10 has an invalid length. [ 147.691705][ T6568] netlink: 40 bytes leftover after parsing attributes in process `syz.2.205'. [ 147.701166][ T6568] dummy0: entered promiscuous mode [ 147.707311][ T6568] dummy0: entered allmulticast mode [ 147.748020][ T6568] team0: Port device dummy0 removed [ 147.780737][ T6568] bridge0: port 3(dummy0) entered blocking state [ 147.814345][ T6568] bridge0: port 3(dummy0) entered disabled state [ 147.853972][ T6575] netlink: 'syz.1.207': attribute type 10 has an invalid length. [ 147.863488][ T6575] netlink: 40 bytes leftover after parsing attributes in process `syz.1.207'. [ 147.958740][ T6577] syzkaller0: entered promiscuous mode [ 147.964783][ T6577] syzkaller0: entered allmulticast mode [ 150.032067][ T6585] netlink: 'syz.2.210': attribute type 2 has an invalid length. [ 150.040217][ T6585] netlink: 164 bytes leftover after parsing attributes in process `syz.2.210'. [ 150.531954][ T6593] netlink: 'syz.0.214': attribute type 10 has an invalid length. [ 150.605334][ T6593] dummy0: left allmulticast mode [ 150.615991][ T6593] dummy0: left promiscuous mode [ 150.659634][ T6593] bridge0: port 3(dummy0) entered disabled state [ 151.130825][ T6593] team0: Port device dummy0 added [ 151.242408][ T6603] netlink: 'syz.3.217': attribute type 2 has an invalid length. [ 151.275842][ T6603] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 151.534485][ T6605] netlink: 'syz.2.218': attribute type 10 has an invalid length. [ 151.542371][ T6605] netlink: 40 bytes leftover after parsing attributes in process `syz.2.218'. [ 151.579230][ T6605] bridge0: port 3(dummy0) entered blocking state [ 151.585998][ T6605] bridge0: port 3(dummy0) entered forwarding state [ 151.664374][ T6607] netlink: 'syz.0.219': attribute type 10 has an invalid length. [ 151.672223][ T6607] netlink: 40 bytes leftover after parsing attributes in process `syz.0.219'. [ 151.720631][ T6607] dummy0: entered promiscuous mode [ 151.726419][ T6607] dummy0: entered allmulticast mode [ 151.754676][ T6607] team0: Port device dummy0 removed [ 151.760734][ T6607] bridge0: port 3(dummy0) entered blocking state [ 151.767555][ T6607] bridge0: port 3(dummy0) entered disabled state [ 151.872738][ T6614] syzkaller0: entered promiscuous mode [ 151.891180][ T6614] syzkaller0: entered allmulticast mode [ 154.442176][ T6638] netlink: 'syz.2.228': attribute type 2 has an invalid length. [ 154.470871][ T6638] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 154.496201][ T6640] netlink: 'syz.3.229': attribute type 10 has an invalid length. [ 154.544857][ T6640] bridge0: port 3(dummy0) entered disabled state [ 154.583479][ T6640] dummy0: left allmulticast mode [ 154.594370][ T6640] dummy0: left promiscuous mode [ 154.602732][ T6640] bridge0: port 3(dummy0) entered disabled state [ 154.763680][ T6640] team0: Port device dummy0 added [ 154.828569][ T6643] netlink: 'syz.0.231': attribute type 10 has an invalid length. [ 154.844989][ T6643] netlink: 40 bytes leftover after parsing attributes in process `syz.0.231'. [ 154.869837][ T6643] bridge0: port 3(dummy0) entered blocking state [ 154.876486][ T6643] bridge0: port 3(dummy0) entered forwarding state [ 155.157497][ T6652] netlink: 'syz.2.233': attribute type 10 has an invalid length. [ 155.178415][ T6652] netlink: 40 bytes leftover after parsing attributes in process `syz.2.233'. [ 155.503188][ T6657] syzkaller0: entered promiscuous mode [ 155.509099][ T6657] syzkaller0: entered allmulticast mode [ 157.524399][ T6663] netlink: 'syz.2.237': attribute type 10 has an invalid length. [ 157.536074][ T6663] netlink: 40 bytes leftover after parsing attributes in process `syz.2.237'. [ 157.660206][ T6666] syzkaller0: entered promiscuous mode [ 157.668816][ T6666] syzkaller0: entered allmulticast mode [ 159.310712][ T6681] netlink: 'syz.3.242': attribute type 10 has an invalid length. [ 159.332830][ T6682] netlink: 'syz.2.241': attribute type 2 has an invalid length. [ 159.342106][ T6684] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 159.565028][ T6691] netlink: 'syz.3.246': attribute type 10 has an invalid length. [ 159.572838][ T6691] netlink: 40 bytes leftover after parsing attributes in process `syz.3.246'. [ 159.614591][ T6691] dummy0: entered promiscuous mode [ 159.619977][ T6691] dummy0: entered allmulticast mode [ 159.712341][ T6691] team0: Port device dummy0 removed [ 159.742705][ T6691] bridge0: port 3(dummy0) entered blocking state [ 159.775788][ T6691] bridge0: port 3(dummy0) entered disabled state [ 159.872616][ T6698] netlink: 'syz.1.248': attribute type 10 has an invalid length. [ 159.893595][ T6698] netlink: 40 bytes leftover after parsing attributes in process `syz.1.248'. [ 160.370824][ T6711] netlink: 'syz.0.253': attribute type 10 has an invalid length. [ 160.407888][ T6711] bridge0: port 3(dummy0) entered disabled state [ 160.424524][ T6711] dummy0: left allmulticast mode [ 160.430005][ T6711] dummy0: left promiscuous mode [ 160.443416][ T6711] bridge0: port 3(dummy0) entered disabled state [ 160.532961][ T6711] team0: Port device dummy0 added [ 160.543433][ T6712] netlink: 'syz.2.252': attribute type 10 has an invalid length. [ 160.573299][ T6712] bridge0: port 3(dummy0) entered disabled state [ 160.592491][ T6712] dummy0: left allmulticast mode [ 160.601318][ T6712] dummy0: left promiscuous mode [ 160.609354][ T6712] bridge0: port 3(dummy0) entered disabled state [ 160.698190][ T6712] team0: Port device dummy0 added [ 160.775368][ T6714] syzkaller0: entered promiscuous mode [ 160.781358][ T6714] syzkaller0: entered allmulticast mode [ 160.887688][ T6721] netlink: 'syz.1.256': attribute type 2 has an invalid length. [ 163.115077][ T6726] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 163.591294][ T6741] netlink: 'syz.2.262': attribute type 10 has an invalid length. [ 163.603700][ T6741] netlink: 40 bytes leftover after parsing attributes in process `syz.2.262'. [ 163.615405][ T6741] dummy0: entered promiscuous mode [ 163.620596][ T6741] dummy0: entered allmulticast mode [ 163.670025][ T6741] team0: Port device dummy0 removed [ 163.689844][ T6741] bridge0: port 3(dummy0) entered blocking state [ 163.698243][ T6741] bridge0: port 3(dummy0) entered disabled state [ 163.741837][ T6746] netlink: 'syz.0.263': attribute type 10 has an invalid length. [ 163.834299][ T6748] netlink: 'syz.3.264': attribute type 10 has an invalid length. [ 163.858525][ T6748] netlink: 40 bytes leftover after parsing attributes in process `syz.3.264'. [ 163.877635][ T6748] bridge0: port 3(dummy0) entered blocking state [ 163.884271][ T6748] bridge0: port 3(dummy0) entered forwarding state [ 163.902657][ T6752] netlink: 'syz.1.265': attribute type 10 has an invalid length. [ 163.989889][ T6752] bridge0: port 3(dummy0) entered disabled state [ 164.035842][ T6752] dummy0: left allmulticast mode [ 164.048548][ T6752] dummy0: left promiscuous mode [ 164.056590][ T6752] bridge0: port 3(dummy0) entered disabled state [ 164.164999][ T6752] team0: Port device dummy0 added [ 164.204266][ T6760] A link change request failed with some changes committed already. Interface team_slave_0 may have been left with an inconsistent configuration, please check. [ 164.258790][ T6756] netlink: 'syz.0.266': attribute type 2 has an invalid length. [ 164.408408][ T6763] syzkaller0: entered promiscuous mode [ 164.428997][ T6763] syzkaller0: entered allmulticast mode [ 166.860384][ T6775] syzkaller0: entered promiscuous mode [ 166.867349][ T6775] syzkaller0: entered allmulticast mode [ 166.878196][ T6778] netlink: 'syz.1.272': attribute type 10 has an invalid length. [ 168.553690][ T6787] netlink: 'syz.3.275': attribute type 10 has an invalid length. [ 168.562058][ T6787] netlink: 40 bytes leftover after parsing attributes in process `syz.3.275'. [ 168.705962][ T6791] netlink: 'syz.3.276': attribute type 10 has an invalid length. [ 168.713804][ T6791] netlink: 40 bytes leftover after parsing attributes in process `syz.3.276'. [ 168.831169][ T6795] netlink: 'syz.0.278': attribute type 10 has an invalid length. [ 169.018502][ T6803] netlink: 'syz.1.280': attribute type 10 has an invalid length. [ 169.027024][ T6803] netlink: 40 bytes leftover after parsing attributes in process `syz.1.280'. [ 169.039783][ T6803] dummy0: entered promiscuous mode [ 169.046163][ T6803] dummy0: entered allmulticast mode [ 169.197522][ T6803] team0: Port device dummy0 removed [ 169.221885][ T6803] bridge0: port 3(dummy0) entered blocking state [ 169.250408][ T6803] bridge0: port 3(dummy0) entered disabled state [ 169.276014][ T6810] netlink: 'syz.3.282': attribute type 10 has an invalid length. [ 169.300081][ T6810] bridge0: port 3(dummy0) entered disabled state [ 169.310646][ T6810] dummy0: left allmulticast mode [ 169.328073][ T6810] dummy0: left promiscuous mode [ 169.333695][ T6810] bridge0: port 3(dummy0) entered disabled state [ 169.357554][ T6810] team0: Port device dummy0 added Connection to 10.128.0.89 closed by remote host. [ 170.866351][ T11] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 170.989808][ T11] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.058007][ T11] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 171.111332][ T11] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 172.102675][ T11] hsr_slave_0: left promiscuous mode [ 172.110366][ T11] hsr_slave_1: left promiscuous mode [ 172.120525][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 172.128520][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 172.137066][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 172.144613][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 172.152400][ T11] bridge_slave_1: left allmulticast mode [ 172.158129][ T11] bridge_slave_1: left promiscuous mode [ 172.164960][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.177068][ T11] bridge_slave_0: left allmulticast mode [ 172.183334][ T11] bridge_slave_0: left promiscuous mode [ 172.189383][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.217333][ T11] veth1_macvtap: left promiscuous mode [ 172.223164][ T11] veth0_macvtap: left promiscuous mode [ 172.230146][ T11] veth1_vlan: left promiscuous mode [ 172.235799][ T11] veth0_vlan: left promiscuous mode [ 172.709920][ T11] team0 (unregistering): Port device team_slave_1 removed [ 172.787283][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 172.826499][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 173.048969][ T11] team0 (unregistering): Port device dummy0 removed [ 173.257724][ T11] bond0 (unregistering): Released all slaves [ 173.741701][ T11] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 173.800871][ T11] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 173.858866][ T11] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 173.913887][ T11] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.009958][ T11] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.100706][ T11] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.152822][ T11] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.209067][ T11] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.311111][ T11] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.402516][ T11] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.478759][ T11] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 174.528633][ T11] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 175.767526][ T11] [ 175.769939][ T11] ====================================================== [ 175.776971][ T11] WARNING: possible circular locking dependency detected [ 175.783996][ T11] syzkaller #0 Not tainted [ 175.788412][ T11] ------------------------------------------------------ [ 175.795444][ T11] kworker/u4:0/11 is trying to acquire lock: [ 175.801415][ T11] ffff888024d24d00 (team->team_lock_key#2){+.+.}-{3:3}, at: team_del_slave+0x32/0x1c0 [ 175.810994][ T11] [ 175.810994][ T11] but task is already holding lock: [ 175.818358][ T11] ffff88801d300768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x292/0x680 [ 175.828778][ T11] [ 175.828778][ T11] which lock already depends on the new lock. [ 175.828778][ T11] [ 175.839199][ T11] [ 175.839199][ T11] the existing dependency chain (in reverse order) is: [ 175.848232][ T11] [ 175.848232][ T11] -> #1 (&rdev->wiphy.mtx){+.+.}-{3:3}: [ 175.856053][ T11] __mutex_lock+0x129/0xcc0 [ 175.861084][ T11] ieee80211_open+0x144/0x200 [ 175.866319][ T11] __dev_open+0x2bc/0x430 [ 175.871169][ T11] dev_open+0xab/0x170 [ 175.875796][ T11] team_add_slave+0xae7/0x2660 [ 175.881118][ T11] do_setlink+0xe14/0x3fb0 [ 175.886083][ T11] rtnl_newlink+0x175b/0x2020 [ 175.891327][ T11] rtnetlink_rcv_msg+0x7c7/0xf10 [ 175.896805][ T11] netlink_rcv_skb+0x216/0x480 [ 175.902102][ T11] netlink_unicast+0x751/0x8d0 [ 175.907407][ T11] netlink_sendmsg+0x8c1/0xbe0 [ 175.912699][ T11] ____sys_sendmsg+0x5bf/0x950 [ 175.918013][ T11] ___sys_sendmsg+0x220/0x290 [ 175.923216][ T11] __se_sys_sendmsg+0x1a5/0x270 [ 175.928623][ T11] do_syscall_64+0x55/0xb0 [ 175.933569][ T11] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 175.939994][ T11] [ 175.939994][ T11] -> #0 (team->team_lock_key#2){+.+.}-{3:3}: [ 175.948170][ T11] __lock_acquire+0x2ddb/0x7c80 [ 175.953549][ T11] lock_acquire+0x197/0x410 [ 175.958572][ T11] __mutex_lock+0x129/0xcc0 [ 175.963600][ T11] team_del_slave+0x32/0x1c0 [ 175.968717][ T11] team_device_event+0x28d/0xa20 [ 175.974194][ T11] notifier_call_chain+0x197/0x390 [ 175.979850][ T11] unregister_netdevice_many_notify+0xf36/0x1810 [ 175.986733][ T11] unregister_netdevice_queue+0x324/0x360 [ 175.993010][ T11] _cfg80211_unregister_wdev+0x16b/0x580 [ 175.999176][ T11] ieee80211_remove_interfaces+0x496/0x680 [ 176.005602][ T11] ieee80211_unregister_hw+0x5d/0x2a0 [ 176.011527][ T11] mac80211_hwsim_del_radio+0x274/0x450 [ 176.017594][ T11] hwsim_exit_net+0x585/0x640 [ 176.022794][ T11] cleanup_net+0x6f4/0xb90 [ 176.027767][ T11] process_scheduled_works+0xa45/0x15b0 [ 176.033841][ T11] worker_thread+0xa55/0xfc0 [ 176.038956][ T11] kthread+0x2fa/0x390 [ 176.043542][ T11] ret_from_fork+0x48/0x80 [ 176.048565][ T11] ret_from_fork_asm+0x11/0x20 [ 176.054115][ T11] [ 176.054115][ T11] other info that might help us debug this: [ 176.054115][ T11] [ 176.064338][ T11] Possible unsafe locking scenario: [ 176.064338][ T11] [ 176.071783][ T11] CPU0 CPU1 [ 176.077158][ T11] ---- ---- [ 176.082521][ T11] lock(&rdev->wiphy.mtx); [ 176.087024][ T11] lock(team->team_lock_key#2); [ 176.094486][ T11] lock(&rdev->wiphy.mtx); [ 176.101512][ T11] lock(team->team_lock_key#2); [ 176.106454][ T11] [ 176.106454][ T11] *** DEADLOCK *** [ 176.106454][ T11] [ 176.114589][ T11] 5 locks held by kworker/u4:0/11: [ 176.119697][ T11] #0: ffff888017873938 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x957/0x15b0 [ 176.130712][ T11] #1: ffffc90000107d00 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0x957/0x15b0 [ 176.141343][ T11] #2: ffffffff8dfae710 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0x136/0xb90 [ 176.150744][ T11] #3: ffffffff8dfbb548 (rtnl_mutex){+.+.}-{3:3}, at: ieee80211_unregister_hw+0x55/0x2a0 [ 176.160575][ T11] #4: ffff88801d300768 (&rdev->wiphy.mtx){+.+.}-{3:3}, at: ieee80211_remove_interfaces+0x292/0x680 [ 176.171371][ T11] [ 176.171371][ T11] stack backtrace: [ 176.177263][ T11] CPU: 1 PID: 11 Comm: kworker/u4:0 Not tainted syzkaller #0 [ 176.184630][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 176.194683][ T11] Workqueue: netns cleanup_net [ 176.199523][ T11] Call Trace: [ 176.202827][ T11] [ 176.205764][ T11] dump_stack_lvl+0x16c/0x230 [ 176.210463][ T11] ? load_image+0x3b0/0x3b0 [ 176.215006][ T11] ? show_regs_print_info+0x20/0x20 [ 176.220296][ T11] ? print_circular_bug+0x12b/0x1a0 [ 176.225508][ T11] check_noncircular+0x2bd/0x3c0 [ 176.230499][ T11] ? print_deadlock_bug+0x5d0/0x5d0 [ 176.235714][ T11] ? lockdep_lock+0xe0/0x220 [ 176.240333][ T11] ? __lock_acquire+0x1334/0x7c80 [ 176.245360][ T11] ? _find_first_zero_bit+0xd3/0x100 [ 176.250652][ T11] __lock_acquire+0x2ddb/0x7c80 [ 176.255528][ T11] ? verify_lock_unused+0x140/0x140 [ 176.260743][ T11] ? verify_lock_unused+0x140/0x140 [ 176.265949][ T11] lock_acquire+0x197/0x410 [ 176.270454][ T11] ? team_del_slave+0x32/0x1c0 [ 176.275233][ T11] ? __might_sleep+0xe0/0xe0 [ 176.279844][ T11] ? read_lock_is_recursive+0x20/0x20 [ 176.285225][ T11] __mutex_lock+0x129/0xcc0 [ 176.289738][ T11] ? team_del_slave+0x32/0x1c0 [ 176.294503][ T11] ? __lock_acquire+0x7c80/0x7c80 [ 176.299545][ T11] ? rcu_is_watching+0x15/0xb0 [ 176.304396][ T11] ? trace_contention_end+0x39/0xe0 [ 176.309602][ T11] ? __mutex_lock+0x304/0xcc0 [ 176.314285][ T11] ? team_del_slave+0x32/0x1c0 [ 176.319065][ T11] ? mutex_lock_nested+0x20/0x20 [ 176.324004][ T11] ? bond_netdev_event+0xe1/0xef0 [ 176.329053][ T11] ? __mutex_unlock_slowpath+0x1a2/0x6a0 [ 176.334702][ T11] ? bond_ipsec_offload_ok+0x410/0x410 [ 176.340174][ T11] team_del_slave+0x32/0x1c0 [ 176.344791][ T11] team_device_event+0x28d/0xa20 [ 176.349735][ T11] notifier_call_chain+0x197/0x390 [ 176.354851][ T11] unregister_netdevice_many_notify+0xf36/0x1810 [ 176.361284][ T11] ? lock_chain_count+0x20/0x20 [ 176.366135][ T11] ? unregister_netdevice_many+0x20/0x20 [ 176.371773][ T11] ? kernfs_remove_by_name_ns+0x117/0x150 [ 176.377500][ T11] ? __lock_acquire+0x7c80/0x7c80 [ 176.382547][ T11] unregister_netdevice_queue+0x324/0x360 [ 176.388277][ T11] ? list_netdevice+0x730/0x730 [ 176.393131][ T11] ? kernfs_remove_by_name_ns+0x117/0x150 [ 176.398853][ T11] _cfg80211_unregister_wdev+0x16b/0x580 [ 176.404513][ T11] ieee80211_remove_interfaces+0x496/0x680 [ 176.410331][ T11] ? ieee80211_do_stop+0x1db0/0x1db0 [ 176.415638][ T11] ? rcu_is_watching+0x15/0xb0 [ 176.420512][ T11] ieee80211_unregister_hw+0x5d/0x2a0 [ 176.425907][ T11] mac80211_hwsim_del_radio+0x274/0x450 [ 176.431465][ T11] ? rhashtable_remove_fast+0xbf0/0xbf0 [ 176.437016][ T11] hwsim_exit_net+0x585/0x640 [ 176.441702][ T11] ? hwsim_init_net+0x90/0x90 [ 176.446385][ T11] ? __ip_vs_dev_cleanup_batch+0x238/0x250 [ 176.452193][ T11] cleanup_net+0x6f4/0xb90 [ 176.456634][ T11] ? ops_free_list+0x3b0/0x3b0 [ 176.461401][ T11] ? _raw_spin_unlock_irq+0x23/0x50 [ 176.466597][ T11] ? process_scheduled_works+0x957/0x15b0 [ 176.472326][ T11] ? process_scheduled_works+0x957/0x15b0 [ 176.478053][ T11] process_scheduled_works+0xa45/0x15b0 [ 176.483621][ T11] ? assign_work+0x400/0x400 [ 176.488218][ T11] ? assign_work+0x39e/0x400 [ 176.492814][ T11] worker_thread+0xa55/0xfc0 [ 176.497416][ T11] kthread+0x2fa/0x390 [ 176.501484][ T11] ? pr_cont_work+0x560/0x560 [ 176.506161][ T11] ? kthread_blkcg+0xd0/0xd0 [ 176.510837][ T11] ret_from_fork+0x48/0x80 [ 176.515258][ T11] ? kthread_blkcg+0xd0/0xd0 [ 176.519845][ T11] ret_from_fork_asm+0x11/0x20 [ 176.524631][ T11] [ 176.530959][ T11] team0: Port device wlan1 removed [ 176.638223][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 176.645907][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 176.653607][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 176.662527][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 176.670635][ T11] bridge_slave_1: left allmulticast mode [ 176.676421][ T11] bridge_slave_1: left promiscuous mode [ 176.682146][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.691163][ T11] bridge_slave_0: left allmulticast mode [ 176.696999][ T11] bridge_slave_0: left promiscuous mode [ 176.702678][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.714658][ T11] hsr_slave_0: left promiscuous mode [ 176.720553][ T11] hsr_slave_1: left promiscuous mode [ 176.726586][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 176.734150][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 176.741905][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 176.749442][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 176.757877][ T11] bridge0: port 3(dummy0) entered disabled state [ 176.765623][ T11] bridge_slave_1: left allmulticast mode [ 176.771275][ T11] bridge_slave_1: left promiscuous mode [ 176.777110][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.785597][ T11] bridge_slave_0: left allmulticast mode [ 176.791244][ T11] bridge_slave_0: left promiscuous mode [ 176.797091][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.809614][ T11] hsr_slave_0: left promiscuous mode [ 176.815492][ T11] hsr_slave_1: left promiscuous mode [ 176.821260][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 176.828722][ T11] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 176.836421][ T11] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 176.843818][ T11] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 176.851588][ T11] bridge0: port 3(dummy0) entered disabled state [ 176.860532][ T11] bridge_slave_1: left allmulticast mode [ 176.866449][ T11] bridge_slave_1: left promiscuous mode [ 176.872134][ T11] bridge0: port 2(bridge_slave_1) entered disabled state [ 176.880734][ T11] bridge_slave_0: left allmulticast mode [ 176.887103][ T11] bridge_slave_0: left promiscuous mode [ 176.892770][ T11] bridge0: port 1(bridge_slave_0) entered disabled state [ 176.906479][ T11] veth1_macvtap: left promiscuous mode [ 176.912028][ T11] veth0_macvtap: left promiscuous mode [ 176.918185][ T11] veth1_vlan: left promiscuous mode [ 176.923487][ T11] veth0_vlan: left promiscuous mode [ 176.929802][ T11] veth1_macvtap: left promiscuous mode [ 176.935355][ T11] veth0_macvtap: left promiscuous mode [ 176.940923][ T11] veth1_vlan: left promiscuous mode [ 176.947319][ T11] veth0_vlan: left promiscuous mode [ 176.953548][ T11] veth1_macvtap: left promiscuous mode [ 176.959297][ T11] veth0_macvtap: left promiscuous mode [ 176.965021][ T11] veth1_vlan: left promiscuous mode [ 176.970327][ T11] veth0_vlan: left promiscuous mode [ 177.269410][ T11] team0 (unregistering): Port device team_slave_1 removed [ 177.325397][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 177.351491][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 177.442105][ T11] team0 (unregistering): Port device dummy0 removed [ 177.473214][ T11] bond0 (unregistering): Released all slaves [ 177.654927][ T11] team0 (unregistering): Port device team_slave_1 removed [ 177.705344][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 177.719574][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 177.827592][ T11] bond0 (unregistering): Released all slaves [ 177.983387][ T11] team0 (unregistering): Port device team_slave_1 removed [ 178.031366][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 178.058675][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 178.153220][ T11] bond0 (unregistering): Released all slaves