7169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4cc13f3e1a5dbc47b4067684c0f311b56070fc71d9e7b03714eb4d7f5ba2958af92df6700700f311335588dcc5d1bb0591645cbafeb017ef93") recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)=@generic, 0x80, &(0x7f0000000400)=[{&(0x7f0000000e40)=""/193, 0xc1}, {&(0x7f0000000380)=""/92, 0x66}, {&(0x7f0000000fc0)=""/119, 0x77}, {&(0x7f0000001140)=""/196, 0xc4}], 0x4, &(0x7f0000000480)=""/86, 0x56}, 0x40000240) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x200, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1fffc0, 0x80000002}, 0x104, 0x0, 0x0, 0x8, 0x4, 0xfffffffe, 0x0, 0x0, 0x81}, r4, 0x1, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000005c0)={0x6, 0x80, 0x9, 0x8, 0x0, 0x1f, 0x0, 0x3, 0x1062, 0xb, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2, @perf_config_ext={0x1ff, 0x2}, 0x20, 0x10001, 0x1, 0x6, 0xfffffffffffffd73, 0x100, 0x8000, 0x0, 0x7fff, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) close(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000780)='lo\x00\b\x008\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb4N\xc3\xe1\xaf4E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x1d0\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, 0x0}) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000580)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000001880)=ANY=[], &(0x7f0000001900)=""/142, 0x4e, 0x8e}, 0x20) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(r0) 17:13:46 executing program 3: syz_clone(0x50000400, &(0x7f0000000200), 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0xffff1f00, 0x0, 0xd, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000001b80)=ANY=[@ANYBLOB="2533f8adbf4afb7f7c46c8131766bf20b7ed26ee041e72c51ae419dd39a84f73321c356b3536d4e2e347d0067349fc6f0d280fbb86ca4ae4782b84d9be1e09b1d5b87a86b4acc738f7fa4396c51429e77d585a09010026c4acd9a9863639dda8b6a0a6e03692a50caabdcc96b5cde0ed987998462ed16a8608d6a2bd360cc954a06b0857d6be2424d86d5095069b7ab30fbcbfff75c6a54b78526b9f44eab88d17ceb0aa3741d8f5414aa4a9263d1bae3f35b20000fa5ccfe5de4c3be2f1401434ee3de2ebdc326cb274edfce3fbe7bec28b22290ce5d7a70ceb1c46b550de74a4dd50d95dd7d92cadf47a4f6600"/250, @ANYBLOB="fbc9c6fb77f6632122cacfd032893ad1a48ea07028c9fbd3ca1d6a069c75764ded145641b499a860d91f65f8df57581687dbf63b5f6393e3fa9bc994b845975ee425a7d1a2"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002700)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@cgroup, r0, 0x1c}, 0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x6, 0x1, 0x8000, 0x5, 0x1a, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), 0x0}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000090000000000000005000000850000000000000018150000", @ANYRES32=0x1, @ANYBLOB="000018300000020000ef00000000000000009500000000000000180000000200000000000000f1710000185700"], &(0x7f0000000140)='syzkaller\x00', 0x40, 0xf2, &(0x7f0000000640)=""/242, 0x40f00, 0x15, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x6, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0x1]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x18201000, &(0x7f0000000b80)="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", 0x1000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380)="1947b18b15c0c986b41d5bfd1dd39336f2a20d9ed67e88f0c22f1d92d92c590651e429edd80e04b8d77ae9050b8c904897a4a68552063baea7a4e1596ffa7dec35e5916184b6b79674cfde357f75cde738c57775c895a3a21e35a4766e108b0e4ef20af029b51c6f9a474016cbda691ee4731aeb480df31dafe57faf095b6026abb42cc1fab49352571d293084a5eaa194f8060a8ec19334c755fa3f2b46a6988a5364cfc8c4c111851bfb5c34a1f10458d5f989e0dbc569990e7110412cd4182c40e58df14c50aae8") 17:13:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c80)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x3, 0x1}, 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x200d0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1000, 0x4}, 0x22054, 0x3, 0x0, 0x4, 0x4, 0x1000010, 0x0, 0x0, 0x43, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x1e842, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000740), 0x12) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 1 [ 239.501412][ T3635] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 239.502456][ T3635] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 239.503563][ T3635] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 239.538763][ T3635] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 239.548660][ T3635] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 240.024989][ T1338] device hsr_slave_0 left promiscuous mode [ 240.039344][ T1338] device hsr_slave_1 left promiscuous mode [ 240.041984][ T1338] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 240.042063][ T1338] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 240.058771][ T1338] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 240.058800][ T1338] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 240.069279][ T1338] device bridge_slave_1 left promiscuous mode [ 240.070437][ T1338] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.142814][ T1338] device bridge_slave_0 left promiscuous mode [ 240.142959][ T1338] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.399178][ T1338] device veth1_macvtap left promiscuous mode [ 240.399472][ T1338] device veth0_macvtap left promiscuous mode [ 240.399605][ T1338] device veth1_vlan left promiscuous mode [ 240.399846][ T1338] device veth0_vlan left promiscuous mode [ 241.640608][ T3666] Bluetooth: hci0: command 0x0409 tx timeout [ 241.697548][ T1338] team0 (unregistering): Port device team_slave_1 removed [ 241.785072][ T1338] team0 (unregistering): Port device team_slave_0 removed [ 241.844488][ T1338] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 241.919067][ T1338] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 242.391818][ T1338] bond0 (unregistering): Released all slaves [ 243.635423][ T4372] chnl_net:caif_netlink_parms(): no params data found [ 243.728740][ T4272] Bluetooth: hci0: command 0x041b tx timeout [ 244.235081][ T4372] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.235142][ T4372] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.236431][ T4372] device bridge_slave_0 entered promiscuous mode [ 244.274687][ T4372] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.274818][ T4372] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.276017][ T4372] device bridge_slave_1 entered promiscuous mode [ 244.622308][ T4372] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 244.624726][ T4372] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 244.841408][ T4372] team0: Port device team_slave_0 added [ 244.843620][ T4372] team0: Port device team_slave_1 added [ 245.010660][ T4372] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 245.010676][ T4372] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.010702][ T4372] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 245.012563][ T4372] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 245.012574][ T4372] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 245.012600][ T4372] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 245.512527][ T4372] device hsr_slave_0 entered promiscuous mode [ 245.564756][ T4372] device hsr_slave_1 entered promiscuous mode [ 245.812326][ T4271] Bluetooth: hci0: command 0x040f tx timeout [ 246.529022][ T4372] 8021q: adding VLAN 0 to HW filter on device bond0 [ 246.577653][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 246.578266][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 246.612078][ T4372] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.630567][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 246.631185][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 246.631601][ T3667] bridge0: port 1(bridge_slave_0) entered blocking state [ 246.631662][ T3667] bridge0: port 1(bridge_slave_0) entered forwarding state [ 246.632219][ T3667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.665083][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 246.665687][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 246.666201][ T27] bridge0: port 2(bridge_slave_1) entered blocking state [ 246.666258][ T27] bridge0: port 2(bridge_slave_1) entered forwarding state [ 246.701045][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 246.706160][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 246.740245][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 246.741553][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 246.742392][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 246.779984][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 246.780838][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 246.800237][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 246.800845][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 246.829791][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 246.831433][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 246.841342][ T4372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 246.927256][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 246.927391][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 246.980139][ T4372] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 247.319453][ T27] Bluetooth: hci4: command 0x0406 tx timeout [ 247.883146][ T4271] Bluetooth: hci0: command 0x0419 tx timeout [ 248.733359][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 248.734076][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 248.759463][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 248.760088][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 248.761161][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 248.761679][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 248.773300][ T4372] device veth0_vlan entered promiscuous mode [ 248.825039][ T4372] device veth1_vlan entered promiscuous mode [ 248.939488][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 248.940158][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 248.940801][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 248.941420][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 248.951980][ T4372] device veth0_macvtap entered promiscuous mode [ 248.987901][ T4372] device veth1_macvtap entered promiscuous mode [ 249.053835][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.053857][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.053865][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.053879][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.053887][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.053901][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.053910][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.053924][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.053933][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 249.053947][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.067533][ T4372] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 249.067674][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 249.068346][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 249.069069][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 249.069674][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 249.080575][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.080596][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.080604][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.080618][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.080626][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.080640][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.080650][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.080663][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.080671][ T4372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 249.080701][ T4372] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 249.081930][ T4372] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 249.082042][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 249.082736][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 249.446807][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 249.446829][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 249.456646][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 249.649677][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 249.649698][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 249.659027][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 252.678970][ T2934] Bluetooth: hci3: command 0x0406 tx timeout 17:14:48 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f00000006c0), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x7, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0xc, 0xd, 0xa, 0x15ea926d8b9d75db, 0x10}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xf}, @alu={0x7, 0x0, 0x8, 0x5, 0x9, 0x2}, @ldst={0x0, 0x1, 0x6, 0x2, 0x3, 0x0, 0x4}], &(0x7f0000000140)='GPL\x00', 0x8, 0xf2, &(0x7f00000003c0)=""/242, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x6, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 17:14:48 executing program 3: syz_clone(0x50000400, &(0x7f0000000200), 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0xffff1f00, 0x0, 0xd, 0x0, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x9, 0x4, &(0x7f0000001b80)=ANY=[@ANYBLOB="2533f8adbf4afb7f7c46c8131766bf20b7ed26ee041e72c51ae419dd39a84f73321c356b3536d4e2e347d0067349fc6f0d280fbb86ca4ae4782b84d9be1e09b1d5b87a86b4acc738f7fa4396c51429e77d585a09010026c4acd9a9863639dda8b6a0a6e03692a50caabdcc96b5cde0ed987998462ed16a8608d6a2bd360cc954a06b0857d6be2424d86d5095069b7ab30fbcbfff75c6a54b78526b9f44eab88d17ceb0aa3741d8f5414aa4a9263d1bae3f35b20000fa5ccfe5de4c3be2f1401434ee3de2ebdc326cb274edfce3fbe7bec28b22290ce5d7a70ceb1c46b550de74a4dd50d95dd7d92cadf47a4f6600"/250, @ANYBLOB="fbc9c6fb77f6632122cacfd032893ad1a48ea07028c9fbd3ca1d6a069c75764ded145641b499a860d91f65f8df57581687dbf63b5f6393e3fa9bc994b845975ee425a7d1a2"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002700)=ANY=[@ANYBLOB="620af8ff0ca00021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020e0e4a9446c7670568982b4e020f698393aa0f3881f9cdc3bf767fb51e1f8093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c29184ff7f0000cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45ef4adf634be763289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa15a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1beeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b343090000009fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000459ff4b40000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b98008006c4a00000000ff435ac15fc0288d9b2a149cd882308a22d9bc8204fddcacc413b48dafb7a2c8cb482bac0adb02d9ba96e1010000000000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4a00fca0493cf29b33dcc9ffffffffffffffd39fec2271ff0158929646efd1cf870cd7bb2366fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969ced595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30fa94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7dfa2e5877050c91301bb997316dbf17866fb84d4c7bb481d1b0b911759dc392ad608318c173731efe895ff2e1c5560926e90109b598502d3e949efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca378e676c3e08c1ed43ca8d3d10994c0b58645ac518a75fde7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d34b5457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464b635197351a5ef0a0fb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d060000000000000062eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa370ac891e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000800000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101293373750d1a8fe64680b0a3fc22dd704e4214de5944912d6c98cd1a9fbe1e7d58c08acaf30235b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d1600003aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a000000003bc13c334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80772fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e89fc745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83186c5526af6fbb869604d51a36a54c832e45b8669dc0d90b075225fde44c4e0973171ad47d6b70ebe660309e1e245b0fd02003af930cd6db49a47613808bad959719c0000000000378a921c7f7f8433c2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205aa3270d25ce1f8174af6de8c12260400b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569ed7aa287378c697f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622e9f2c66ee7e30393cd7a4d67ff2a49c4f9360984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5002512bcbf9b24accfecb0f477db103463af2847e6ade5b9e065ec0d0ba58fedae5f08818fea475b169469f9efd131925d98c34b3b47e5c46d121ad5087e1cdee39f5cf21d2e80a64ac97e71cafc29bfb78db090dd12225efeda2e93bf7f6ba7865e9c380929d210bf5858e2a4ff8e8d1e8c9cceed07c6312b734c72510c94f76e7078ce4266f1e0ac9429f8013683301277a11e25b248b61180cb6207a0e26757f3f1bfc6c27f3720d1fb74afb17f3b5239bc2243853d5234afb05ed6024e94dee34666c5b5522b54cb433efa54b4e9022533e7c89bdee957dfa9ded9f16fdcd1b681e4c72f32fa3334313e334cc140daec7dcb22f463457a1a5ac230bbded86258206046f556589f5627ab2751eb34d940519f009412098398ad822a8509d2d32da656ac5935e4c7f9503ce4daf13300dfd611528049310544d3e8613926fbe2647e258932592c9123f1c74023144442d09ef90c64950176c666da6b6581091c54beb2379aa70501c42bd9c4e4f426ab5ff2a33767b408ed19e399c33b52abc4ac24da0d4cf07d93029583591c33f0f80513c541581977f2e9735e1edb66fdb2722eb4b0b670ba74fdee2f1a3cf85777af5d8267acaa9d83c23a4b40d0f53dce003c03c5959e405fc4f2c05d3394f014a39caabbeff7c7cadbdc57def7f5f758aa46b6e2fddc779770d7e395c4ac2a136a30e7c0a301dffc5565d7244fb29cd302c36e76221a3c4e21559216c078f06b01885a83da16bf8548776a0ae88dfeccc9ad64d2fe3cfdeb9684b7b7e5c00f7323f8214ed0189539e0e3e34c8e542c82ddbd6a75c1adbedef4d5d69b246a5a36ab802b0161908e748ed9891678c228413bf51b18a25bf776b9d1f1fedf97cf5e7de4455ea359e5796bd60cc415066fc271a2bdb7db13e72d1a99b375ff874037faf6a1d1aacf46a57346d000000000000000085c1b64dd5178485ad0f8557ccae7c06a40e8bd2ce76927bb0923dc380fd153cd2ce1242bc0a6e0fff9cfb70d41b02414730f572ca2a4898426eb6d416ff14aaefebd84bd4000000000000000000dbd064fe868ff4929d489badcf5072c61231bec614423bbf7df2989db587bf49abc6ff4d842309a1fa7f268e2c453cd8b9a746d5c6e820453a377fb09f5799b43c1951f56c211170bc102a3437778676928a1b4bd8ddc8db197d6b63913e6dccc20ccb26bc231f1428502b3279d0aace2caf8c8f5edbfeffe6d5b36439fe0f70b34ad0f1a4cad44c5237a2fff1e8f8e0521313c30a9fb5fc54ae85d19599bb1c2283e3f7bb01a11a1845db6b8eba64b45f1c000000c0c4bef4bf3e1d9b0e1b4e4147d5eb0f9b9bfe80984650dce289524659d70fc7ab8485c054e51ad1bef44c5d6cfaaf7efb61be7c38820a4279d69ff337b0f3f9c2c55de05d1c3682c41f624e735c3ce0a7b0f3d784c96cc57c83e78b336cb4022c19917284534ea9efccef28374885759f39c444d78a3f78ec3bafb4af2e7a64c967c494264c3b36591eb2049ede272a00dc74628a45de9fd219c63f1f0e2e187071f9468f1f4b880ae18459f3790010aff9f89be79e7b81ed89139dd8152e5009fa164f36bce90c661b35022c1cbbdfc9aba07ebed92b94ff9f0e1dbc0a29d5799e3ecc8eb3b6fe5f791a4fc7db9e97be3f944b2360e3c9a0d2b0ab83db2fc1c3d28efea92828494b88008b9082394c113ec071cdbd8556d7cf7c11236d699da109de535f64e008a175d11e80f96e10d8527d13e0e1f2b85ee7e5000000e3a2e6f4a56a505a4aa4f747aa54003d86fc5f6cea39dc747f20a5bd56d512ad55e3d6d26b6309fc7eeaee446d44ffc705655d1d590eb9dd8502a4170f83d634dff910f5d164416411a260c2da5b94ce8035f164a9da1d7327e2bcc520d082868437330f3acad958ce446be065ed1cd69f0770c01f1e34267324093c371ec6d0816f0987e87ea82579bb9028e7b1ac38fc2dae92a13fd47f6c648e1f92"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000600)={@cgroup, r0, 0x1c}, 0x14) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000), 0x0}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x6, 0x1, 0x8000, 0x5, 0x1a, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x7, 0x2}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f0000000000), 0x0}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a40)='cpuacct.usage_user\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000090000000000000005000000850000000000000018150000", @ANYRES32=0x1, @ANYBLOB="000018300000020000ef00000000000000009500000000000000180000000200000000000000f1710000185700"], &(0x7f0000000140)='syzkaller\x00', 0x40, 0xf2, &(0x7f0000000640)=""/242, 0x40f00, 0x15, '\x00', 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0x6, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r1, r2, 0x1]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x18201000, &(0x7f0000000b80)="eacdda64fb1ee32b91b19a5feff342e82c26c050c005cbb1b409f3505c4d68c17c4b5fa8d575209f6b94b64af7c1e90ad51e478178d04ef6648a53f797f878f763e244e71a0a124c902fa0001ef2c750b8846386ce286ce4e9d297beafcd07164dd2973ed19ea4aba85ed29c1dee5a1c8bb93ae68a30d2ef2b449683e49b8a131bc3f7b3f8f9137e60b2ed8ae9d5543cf9e1daba4521844b63648549f9e6b0c507a6425c0eb1f699fbcc6ad64b2278d0fdd2e004b72c618f95d55dc4cd3c166891fee860c2ce264f81901f6b994d5759ab61f6d3fb68dae02be4c86353b10211511a864aa58049d7b8cf63f57c9a1cdb1855b3b5dba2b69303e6184a4379e8e6dd3a550d7c10807e1f1235c6c49a4db829c4b69abe577e78e81534267d37cb57aef7e614f806efb208175cda20a01fa52104fc266a421ad304af75c475b820af6757b49a2ae91abd5bc5333fd431f7edac1c90e4acfdaeec1cfac6b07d5062e2a93e390ffdfc3f5f4098c9386091cf2f28017a8cbcc1362bfc19cef97147f1c47f601febafa1ffa9f06037b869e87cc38b35fcadfb4b3ec77faa1c87f3ce6e93ade38e019b264e85c9b06be5f325b401295bbddee99b6a7fdc0bd684152afbd021bcef32f4fa9fc490f9e4ae089b1063abc7ac2f9cb7efc88cbfc728695ade44a0bdf458cfd0af836dcd32032ba69c06a7a98bdc63dd440b2a6175e5d4ca59388c5fac0ba957d09273b5642fbab2c8ed37d061eb6cb1f25b16c78e1034fdc0ebc27cd67bfe4c9b0cf844c68fdfaae3157a43f03a5d9341d9b90e0d57a55904685ca610f746c29fd5127fc6639b67008154deb092901338dd76dfc89bcda4d5e1bb86808c0290293f9eb659b6a3c0398f08698efa14c9aef46833e92686c8524b7a88aa5001dd61a2c0b264c5bb5b51c7e2c6e197bbfe9763334357ceb1e1e0e0a6d01d16b70e98cef620aa3b79bb1f271711695d29070a3857616f1ab2fb3c02d3c09a8e7c8e4613ddafa7f3726f47868a5ca27a62c7e9cb09277cc84a93af2b27a27aa529af354f7b7949b1fdbe96d8257a773979531c12e7f2172beadc6ca3acea059a8e597640d79438c1074d9a560b6c6463370be76567d079326bd01a59ec203124b9930073eb3532285e8b576b4db950d2e3d92dc6f0c1a81941e2bc352f018d95bba76af9a81d0389f1c2351dbd105beb99fc55a3bc2bc909dd834edebcaaeb2ca2109257f0aca58d351a5dfea672213ee381081154d3ddd6ee6e17e786ef7e8701047bb60bc40d09c7a66e745077ae14921cb065523577d97ddb0bb91e97610b80d6bcf32867832c00a8ce8cfc36b5ca1466fbb4c9bdd0278cdc9dc8655120675969674bd0219acfab812a64034e4d5650b3ba432caba8193b6333c6e6a948521c6170d92b40e0e5b1c7573b61234f76f06777b5fa97013c7f6c5143bbb47c135fc8d8e5c353d80a519fde95fe69c9ef36f9d9534bae184deb021dbc13fb9e585ed6cf775e4b7f82ce7c34c5219950cddba85b8d32b35e9c823dd0f72841121fa2935c9b9422c5d4c0dde864debbdef17300b2955b1e02d8544afac17c691b0443698ec858215a84bca57186ae1d9558dd946ca81e7fbcda8af5061f7a7ded1f8b7f8d01561b62bc81d183922a762adb1a42de35c4181bb362cc0eca1a606ef4d631f2c2e5189912407d5d5f98cf29f11fb8b433d3f10251d1d58a8a137dc2b85a3da5996b227373e7c56ca532f44c3531075dcf7eb9482098fecda5ecad9e4e33b1557af6907064748c2a168dc8410451b4c4a41d830f91c692a8fd0b7e39078588366ed5a4d37af79f9369552512a51b69003047326d8b068da1b15599f8457d7d0cb602f2a28bbd3289a818b575001f47a1d89fdb14ca157da75b689c3e797d11f8d7077c645c5a1915f672a07a8c72bea5448eab4db0b12c81954ee4556c4aea408a2a93df0925eea0062ee1cd530f2bcff599d153c655d6ff5ea6e0424fecde0857dd50a81b65e26154d9cb4fd1f9b8457ec2ff35a39f3d07b393b80ce583853c8752c8a20d7597e9cbda764c08f12cd5aeedae2277968f5c190a84fbcc02b110a5df797e386c2ed331fc35bba639624ffa6c48f961e2ffacf295b07b4d39acbe68938cc30fc706721d1c9bc1316be316a8b06d6aee407f4649adeed4c1da0da7ec0ba1b00f3a951fa434c1494d6d803dff2ba5cc5f579567f9ba758c6b0f82b4d152e102180d31f1a400a3ef48f937c03861ab0bddeef0f87051600891629021cd197fc0c5916db8097fb8122fe0f4c7f36e08b9e3c8ac5dd0aaeeb3da544ba4699766b69f4f8fc280fe17d48c65243d8c3943e0cb0c43aab301cd392b29dfa22e40195322428a9c21f8f6ad1df8476b3b0a3cec2a5836da8a95ebeaf1645554daa188d3f68087a1e66e71a980e6361a97a555a0f65770596635f67b90727ff52dcf4833de1d08150b37a0ddd9606e592e249c53092e724e4eaeea544625c764a616cf057b336691d769bf8c959018e28381af4026dbd5d18d7e8b8f98635da6fbc04980ab6c9ddfde18d7e0f37a8e407add0ef281e5c5203322f679a38b131aa8219f19b425c33b9aed07abbd736c51338b9a019a17dad7de529ff222fa4fb2b7c9d20f806a1907853992645a4526343f5029118758396ac487b8bf97b816629c984283b1835c16b2f5bc94cf44547bec9b05f2bd2cf1411819f75d520a72da407fdcce9dfe96ebc36977ce5873cbb7420954e3699feae605bd37702a2ff11e72b76e9847446e2c4c2b10775cb00a9ae286ee388522011cefcbc4def46a26c0452a855fc6e5f876884702498abb41758eff230e88b51c66bbeb79efc9b769c6377fcdb7b9eb8fc62719febb4dff6b4627a64c72a4b83a19258f76a40f1bcc9f344c23bcb5bec4a1ac04cb9381c4380b94aae3c0163ac8b6e96314a3e3a48b331ff35c465eb0b9f61c68dd9db306db0e87f11b00fcb3d1b6d04b6954e56a32d5e5c04ea9c8a18af8f47914d05d0611f7622434c04fffb062b5740d543f67ed1340e101384b1d77de9e85d0062d18f5158e4264a1da46eb55d0288228a351f926cecd9d1effef1e9541bb083f568acbaa3ceb8bb9bc8ef6073d24720830e89599d1c2ca1a75d757f365bdcf66511ff6e48d7b715260f4a13ed63adeeacba8557332483d8d8714e4811b079f514318a7b3fa880b506b0a90ac7855802e736a5e70b6a853455112513d5eb29897e81123a4d1736cf810efc61a5c1204f020a35346e7af7a42f32c5920889739f68a4536644489ec1a1425182ad6a27f5c0501b965dbdcddc2dd1e4fd3ed8940ee0451fdb958bb466574d1ff07a507bc23c27b6a822456f696346245a9208fd7ffe4fd4cb556940074859e7217767f09ac33baac0cb7aca4df2cecde8f7b8c5401cfcda867f14ed3831e103daa0095fe749140329e372d5c18c69e818543d8d3409b10a22cb168ce3835dac6fde8e0ad2a3aa53c82740ffa0b24d6967c40d089cd4e571dd4eafad35172ae421c7a1d7d671e6782937cd0fe22d6bc0a543493cfad2e2024420f373bfaba7955fc9a1265f15bb6f2e733d656a94e02f65316ef24d9a13f21a1790b8bbde43bf857fa9622c3c6d930965c400bb43c7e1b12456d8a60a12b3e35ccd6e7ff65f54949eb4d752d61b1067b8fcae8b3ff0d9ca071d9ec0a1847764865feeb6677fa850bbe677909a56d1834392573005104982621a4c20a222ec1922870c99b4f6f7c6b389733e71ab19c81017a50b633493f1f1c41138a706bc640b79b6dbb1af4a3c8f2903037a55a01c85b4d953233d7075912dd32b27a6d4eba90532e58cc985551d0ac2db9aacee587edff1297d9bfd2ba76fcb00a304b9d9fa6a8d04a0ad5384bf14e24c8343b6a5db5eb331f6eea8de1a14b24aa7f147d10d6e171d868c112db7db6bb72ff2746f20fad553ae9d80e97b8a252bb7b26602fd3be9013384509337789f854c236d8f363442600943c2e5d14cafc73e2bdbdbe11cd936ba8debdf14d24575609f79e707e09646f134a7665518b9eb945096500039a1a54bd8fb915f6f208607476b72df0b8443c78c938e4bd56fe611ac912e9a8a51d84ef171ff5392594e3ae7674a841a2b3bcc7a8900402718ebe2d5015e10bee9465dc4b7416c29b9d188b2ad1a11d955d4bda69c89152327e3489a3145984a2b30a0432dfad61cf01f52de5ef731087ea63ba124175e0a8ac12b6f7833c1ced7497364cd7483a80a9e4c4dd58544b4b88fc37e964b4d7464ff495dda35bab896e512fac948d76a0bfb6ebb2b3b53e32fa3877ea4655b350f65782a254f85adee58a14b0d5f77865cd8c61b8a8d53ecdcab4e9cec24903005646abdf0bc2ed369699afd659a97b92311bdb64503a8e0fef6928b332f2851cd286762d39aea7b9041ee869471177b67cfa6f38f198d65a446956b4e3d0041accaa9f961831397c7529787020337ae019c53b4a5f6e2ab3595a030a2a6462c486350eecab407f29a118b211f27c52789fef7033cba4abf4a2947278ebe6f0aea5b55f027236a009fbd446607586f8cb3c23a2a2d84d7ff8a2040e9d59005123da2423ee7717e4d92239d2377d7a0c148fc6c3537985b66da3a7e1756cf38a4d0b194f8a1e0ff0b907a2f1dab15744077ef54e97a5fea941bca2283705a76ba9523a23396c43086c8ac6d1cc3b1702e10aa125682a41f86c76bf4ae66b4cf3296ffed8fe574f7e0e18d5892219b39828c98b82153dc1ae205505833cb7faf59f3cb1305975261bffe8572a3a8eafa8418ed1aebd1f485bfdf3eef6f701ffb4ca72f820d068c456666e7daf60e75b5afc6e8ee077897b755f7d0a66a6ce35fe7754fc82f908703bbd1f0238c1fc7789ba1a902cad5d2a4ae399b56229764407f032e5f8d534cf3fc64860232c8de1d9f80e1a2c173062efe446749e7e4433dcf62d56edb48c80f29d7c911c2d929326e607889a9797b9ba9796eae2623c80ec9ad3bc17d93484744bd27ff2568c2e8f28669743212c3ba54d04e10cb96c038ac23c079862f129a15c4bc0d507e567766d9e802012ad7dcbf2cf45d913421cbfaef3c099a9a4462f6c04ac0c212ea5cc9c0d34db3053a39b070b4fbeeed7f1f9e71c5f682571e94a1d7285b117ca2e9bb5552764e30eb35915386041719042009f99117302b57a264187089eccef79648257d4b0c9a6a692201b584b71aaeb5cb0431a6eec3a76b20bf82ce1bf504ac730923060d33396802a2647b56bb382935b4090bd665b04e44e01821ea93aeefa83eaa11de96e0b2a832f9f1407fc92fba5a2aeb0444869df650ebee5beb2bf13f6bc69a14c23b6344cf7809c4692f457ad1c157546d816e35bb048fbd4de8ef98b8a44f0e37de07816df44f8dd3c7cdd34ddc59ab657cc45a1224a42814064cfc6e6deaa71af702144615a5e2f08368b5092c26e982a9157ed2ca27c578d4e314e74b614122f5bb3d214e5227815b9f2d8b65cbff93f445da2aafd2a70451bf977dc6af60e241a2a07c09bbdb7bf36d8eeef7961d1271720e3dc092c7d8892230a41bf799e44aee79c01d2ee0918e3a2d4802fd3081924b5aaf6a47a65244214253cc530abade99708107b6999ba45e903e1c289d6fa4f9668825081431a5bc3222dee4eddaeb701d73cf87a1fa9efb86d7c0b7286aec4729901de00fc62568f6a33832639c0bdc85c707465b4f3b03668f23e62aabd5e74534e2f4199be1bae713d49c3d37022f97d1013717118e57f2b71821925b2bda6c177037086bf1674", 0x1000, &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000380)="1947b18b15c0c986b41d5bfd1dd39336f2a20d9ed67e88f0c22f1d92d92c590651e429edd80e04b8d77ae9050b8c904897a4a68552063baea7a4e1596ffa7dec35e5916184b6b79674cfde357f75cde738c57775c895a3a21e35a4766e108b0e4ef20af029b51c6f9a474016cbda691ee4731aeb480df31dafe57faf095b6026abb42cc1fab49352571d293084a5eaa194f8060a8ec19334c755fa3f2b46a6988a5364cfc8c4c111851bfb5c34a1f10458d5f989e0dbc569990e7110412cd4182c40e58df14c50aae8") 17:14:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c80)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x3, 0x1}, 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x200d0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1000, 0x4}, 0x22054, 0x3, 0x0, 0x4, 0x4, 0x1000010, 0x0, 0x0, 0x43, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x1e842, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000740), 0x12) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) 17:15:17 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='kmem_cache_free\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x1fffffffffffff43, &(0x7f00000009c0)=ANY=[@ANYRESOCT], &(0x7f0000000a80)='GPL\x00', 0x80000000, 0x38, &(0x7f0000000340)=""/56, 0x41100, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x0, 0xfffffff8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) r2 = syz_clone(0x4904080, &(0x7f00000004c0)="9974471bb5355a1b4f661d69d8341fe11bed7f93b85b740d7e8b555fd3583a58f5ff106be6ae433345a00ec4ef225b26db964039d5c82b3290e51c4eca2c32f5b8e84623d485243e45eea3a1fae7dd5425c19b79c0b4459796c1453ca59c8c1f7857e65a91f4b62be39ff88cd7136f545c4549b50dc8600614", 0x79, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000540)="452c3852769154e4c0f7f84d2329b30a71800a82d014c018981edcff21e3a8a6a61ee5671311a2669e7fb3d737e5abbe246dc0fb3b28b1e55baeeedc030ab3ed2a7b132c3eeb80ec6836") perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x7f, 0x5, 0x80, 0x0, 0xdec, 0x200, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x5, 0x8}, 0x10042, 0x8, 0x5, 0x5, 0x71b0, 0x3, 0xfffc, 0x0, 0x7f, 0x0, 0x9}, r2, 0x3, 0xffffffffffffffff, 0x2) 17:15:17 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001c80)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000340)={0x0, 0x0, 0x3, 0x1}, 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x200d0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1000, 0x4}, 0x22054, 0x3, 0x0, 0x4, 0x4, 0x1000010, 0x0, 0x0, 0x43, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x1e842, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000740), 0x12) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97\x04\x03\xdc\r') r2 = syz_clone(0x40200000, &(0x7f0000000140)="f1c9b561540095156bd6f21de7b0ee304223312b19539057baea094a6b499c272b2400ec06c33c1d1147c3da65717169d4dc3213f7b102f6e6790d408fe4ba78c0df0e5687f635db84062d1e8973c373cc8a14ed70d1e2cc936046361f239a17d6f809b7c1f23f3328cbaf2f8df5d65f19b19f2838241d7147f8ecff942a4254a27f03bb12d747ed60c2b78187702da02c5f18d99a13a1e9", 0x98, &(0x7f0000000200), &(0x7f0000000080), &(0x7f0000000440)="f7593c785b65f6ce1170dbcba92edf1ae14d8d2f4c062bb3f86cc13f3e1a5dbc47b5067684c0f3115f9870fc71dde7b03714eb4d7f5ba2958af92df6700700f311335588d8c5d1bb0591645cbafeb017ef93") r3 = perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0xfd, 0x0, 0x5531, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x81, 0x3}, 0x8004, 0x1f, 0x0, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0xfffffff9}, r2, 0xfffffffffffffffd, 0xffffffffffffffff, 0x2) close(r0) openat$cgroup_ro(r0, &(0x7f0000000380)='memory.swap.events\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8923, &(0x7f0000000b40)='lo\x00\x96o8\x14d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x0e\xa0\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) 17:15:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) [ 316.971590][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.971640][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 17:15:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) 17:15:52 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) r3 = syz_clone(0x12058000, &(0x7f0000000340), 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)="6ced59117ae9ce7519e9119a66f788380a33946f85ae6188abfc52c2c288738a8df0e5d1b08e5cd5c967b8988a09f36cb043e7440cedd0c502c74a0aafce2bc2f5fbe1f8e953dc24c6ca4b4d9d094524d87696841f10f0cae59ee0c11c334f20cf44c8e1522ca09fb1ce1b2acb0a6e022ed4086713294165c9f8613287f7deb2b6693c171ceefceb3f") openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x9, r2, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x3, 0x496439e6}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x36006) 17:15:52 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f00000006c0), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x7, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0xc, 0xd, 0xa, 0x15ea926d8b9d75db, 0x10}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xf}, @alu={0x7, 0x0, 0x8, 0x5, 0x9, 0x2}, @ldst={0x0, 0x1, 0x6, 0x2, 0x3, 0x0, 0x4}], &(0x7f0000000140)='GPL\x00', 0x8, 0xf2, &(0x7f00000003c0)=""/242, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x6, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 17:15:52 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) [ 319.479578][ T8] device hsr_slave_0 left promiscuous mode [ 319.481666][ T8] device hsr_slave_1 left promiscuous mode [ 319.483575][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 319.483604][ T8] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 319.509988][ T8] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 319.510017][ T8] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 319.560816][ T8] device bridge_slave_1 left promiscuous mode [ 319.560946][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.655702][ T8] device bridge_slave_0 left promiscuous mode [ 319.655871][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.680738][ T8] device veth1_macvtap left promiscuous mode [ 319.680802][ T8] device veth0_macvtap left promiscuous mode [ 319.680927][ T8] device veth1_vlan left promiscuous mode [ 319.681013][ T8] device veth0_vlan left promiscuous mode [ 322.042069][ T8] team0 (unregistering): Port device team_slave_1 removed [ 322.141949][ T8] team0 (unregistering): Port device team_slave_0 removed [ 322.236483][ T8] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 322.304685][ T8] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 323.136577][ T8] bond0 (unregistering): Released all slaves [ 325.160161][ T3639] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 330.960413][ T3639] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 330.962275][ T3639] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 330.986798][ T3639] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 331.000850][ T3639] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 331.001455][ T3639] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 331.002666][ T3639] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 331.994058][ T4841] chnl_net:caif_netlink_parms(): no params data found [ 332.701366][ T4841] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.701500][ T4841] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.728527][ T4841] device bridge_slave_0 entered promiscuous mode [ 332.730823][ T4841] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.739134][ T4841] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.760734][ T4841] device bridge_slave_1 entered promiscuous mode [ 333.059854][ T4841] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.080834][ T1157] Bluetooth: hci0: command 0x0409 tx timeout [ 333.151185][ T4841] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 333.367742][ T4841] team0: Port device team_slave_0 added [ 333.415807][ T4841] team0: Port device team_slave_1 added [ 333.690925][ T4841] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 333.690940][ T4841] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.690965][ T4841] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 333.693024][ T4841] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 333.693036][ T4841] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 333.693062][ T4841] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 333.982755][ T4841] device hsr_slave_0 entered promiscuous mode [ 334.049004][ T4841] device hsr_slave_1 entered promiscuous mode [ 335.159032][ T4271] Bluetooth: hci0: command 0x041b tx timeout [ 335.349397][ T4841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.357769][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 335.358361][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.386505][ T4841] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.401508][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 335.402164][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.402589][ T3666] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.402646][ T3666] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.403226][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 335.416402][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 335.417069][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.417531][ T3666] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.417588][ T3666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.495456][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 335.549956][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 335.580363][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 335.581561][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 335.582403][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 335.602182][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 335.603059][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 335.643611][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 335.644267][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.707107][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 335.707882][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.740705][ T4841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 335.897853][ T4841] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 335.899012][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 335.899200][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 337.245600][ T4271] Bluetooth: hci0: command 0x040f tx timeout [ 338.401841][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 338.402535][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 338.553428][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 338.554159][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 338.555031][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 338.555641][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 338.593567][ T4841] device veth0_vlan entered promiscuous mode [ 338.660658][ T4841] device veth1_vlan entered promiscuous mode [ 338.856223][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 338.856941][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 338.857560][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 338.858254][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 338.863946][ T4841] device veth0_macvtap entered promiscuous mode [ 338.950580][ T4841] device veth1_macvtap entered promiscuous mode [ 339.081631][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.081654][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.081662][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.081674][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.081682][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.081695][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.081705][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.081716][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.081724][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 339.081738][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.100281][ T4841] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 339.100428][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 339.101167][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 339.101802][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 339.102423][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 339.152172][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.152193][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.152201][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.152214][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.152222][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.152235][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.152262][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.152276][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.152285][ T4841] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 339.152299][ T4841] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 339.153601][ T4841] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 339.153716][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 339.154410][ T4271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 339.327214][ T3663] Bluetooth: hci0: command 0x0419 tx timeout [ 339.782166][ T4093] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 339.782187][ T4093] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 339.784663][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 340.026803][ T42] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 340.026824][ T42] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 340.029899][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:16:25 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f00000006c0), 0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x7, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0xc, 0xd, 0xa, 0x15ea926d8b9d75db, 0x10}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xf}, @alu={0x7, 0x0, 0x8, 0x5, 0x9, 0x2}, @ldst={0x0, 0x1, 0x6, 0x2, 0x3, 0x0, 0x4}], &(0x7f0000000140)='GPL\x00', 0x8, 0xf2, &(0x7f00000003c0)=""/242, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x9, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x6, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff]}, 0x80) 17:16:25 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) 17:16:25 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000000), 0x10) r3 = syz_clone(0x12058000, &(0x7f0000000340), 0x0, &(0x7f0000000440), 0x0, &(0x7f00000004c0)="6ced59117ae9ce7519e9119a66f788380a33946f85ae6188abfc52c2c288738a8df0e5d1b08e5cd5c967b8988a09f36cb043e7440cedd0c502c74a0aafce2bc2f5fbe1f8e953dc24c6ca4b4d9d094524d87696841f10f0cae59ee0c11c334f20cf44c8e1522ca09fb1ce1b2acb0a6e022ed4086713294165c9f8613287f7deb2b6693c171ceefceb3f") openat$cgroup_ro(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x9, r2, 0x1) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x3, 0x496439e6}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x36006) 17:16:26 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='kmem_cache_free\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x1fffffffffffff43, &(0x7f00000009c0)=ANY=[@ANYRESOCT], &(0x7f0000000a80)='GPL\x00', 0x80000000, 0x38, &(0x7f0000000340)=""/56, 0x41100, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x0, 0xfffffff8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) r2 = syz_clone(0x4904080, &(0x7f00000004c0)="9974471bb5355a1b4f661d69d8341fe11bed7f93b85b740d7e8b555fd3583a58f5ff106be6ae433345a00ec4ef225b26db964039d5c82b3290e51c4eca2c32f5b8e84623d485243e45eea3a1fae7dd5425c19b79c0b4459796c1453ca59c8c1f7857e65a91f4b62be39ff88cd7136f545c4549b50dc8600614", 0x79, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000540)="452c3852769154e4c0f7f84d2329b30a71800a82d014c018981edcff21e3a8a6a61ee5671311a2669e7fb3d737e5abbe246dc0fb3b28b1e55baeeedc030ab3ed2a7b132c3eeb80ec6836") perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x7f, 0x5, 0x80, 0x0, 0xdec, 0x200, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x5, 0x8}, 0x10042, 0x8, 0x5, 0x5, 0x71b0, 0x3, 0xfffc, 0x0, 0x7f, 0x0, 0x9}, r2, 0x3, 0xffffffffffffffff, 0x2) 17:16:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x208}, 0x0) 17:16:26 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000300)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(0x0, r1, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000002c0)=0x3) write$cgroup_int(r2, &(0x7f0000000240), 0x12) 17:16:26 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) 17:16:26 executing program 5: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000200)="bd", 0x1}], 0x1}, 0x0) recvmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000180)=""/99, 0x63}], 0x1}, 0x3140) 17:16:26 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:16:26 executing program 2: bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) write$cgroup_subtree(r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x509002, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={0x0}, 0x8400, 0xff, 0xfffffff7, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0x8}, 0xc) close(0xffffffffffffffff) getpid() perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xc0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xda3, 0x1}, 0x0, 0x904, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() [ 352.163240][ T4896] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 352.163275][ T4896] CPU: 0 PID: 4896 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-12183-g08c79c9cd67f #0 17:16:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500001a6d000000850000480e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64=r1, @ANYRES64=r0, @ANYRES16], 0x24) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0185879, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100), 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'net_cls'}, {0x2b, 'net'}, {0x0, 'rlimit'}, {0x0, 'blkio'}, {0x5a, 'io'}, {0x2b, 'cpuacct'}]}, 0x2a) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r4) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0xc004743e, &(0x7f0000000680)='&@[\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={0x0}, 0x8400, 0xff, 0x3, 0x0, 0x3, 0x0, 0xffe0}, 0x0, 0xffffffffffffffff, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1a001000050}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xd, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x4010744d, 0x20000007) [ 352.163302][ T4896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:16:27 executing program 2: r0 = syz_clone(0x41000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000700650000850000006d0000008500000050000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x9, 0x5, 0x4, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3f}, r0, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 352.163314][ T4896] Call Trace: [ 352.163320][ T4896] [ 352.163329][ T4896] dump_stack_lvl+0xcd/0x134 [ 352.163494][ T4896] dump_header+0x10b/0x7f9 [ 352.163536][ T4896] oom_kill_process.cold+0x10/0x15 [ 352.163566][ T4896] out_of_memory+0x358/0x14a0 [ 352.163676][ T4896] ? oom_killer_disable+0x270/0x270 [ 352.163708][ T4896] ? io_schedule_timeout+0x140/0x140 [ 352.163793][ T4896] mem_cgroup_out_of_memory+0x206/0x270 [ 352.163871][ T4896] ? mem_cgroup_margin+0x130/0x130 [ 352.163923][ T4896] memory_max_write+0x25c/0x3b0 [ 352.163958][ T4896] ? mem_cgroup_force_empty_write+0x150/0x150 [ 352.163996][ T4896] ? lock_release+0x780/0x780 [ 352.164078][ T4896] cgroup_file_write+0x1de/0x770 [ 352.164162][ T4896] ? mem_cgroup_force_empty_write+0x150/0x150 [ 352.164196][ T4896] ? kill_css+0x370/0x370 [ 352.164226][ T4896] ? __phys_addr+0xc4/0x140 [ 352.164306][ T4896] ? kill_css+0x370/0x370 [ 352.164329][ T4896] kernfs_fop_write_iter+0x3f8/0x610 [ 352.164401][ T4896] new_sync_write+0x38a/0x560 [ 352.164462][ T4896] ? new_sync_read+0x5f0/0x5f0 [ 352.164499][ T4896] ? lock_release+0x780/0x780 [ 352.164557][ T4896] vfs_write+0x7c0/0xac0 [ 352.164595][ T4896] ksys_write+0x127/0x250 [ 352.164627][ T4896] ? __ia32_sys_read+0xb0/0xb0 [ 352.164659][ T4896] ? syscall_enter_from_user_mode+0x21/0x70 [ 352.164688][ T4896] ? syscall_enter_from_user_mode+0x21/0x70 [ 352.164724][ T4896] do_syscall_64+0x35/0xb0 [ 352.164756][ T4896] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 352.164805][ T4896] RIP: 0033:0x7f74e2889109 [ 352.164827][ T4896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 352.164857][ T4896] RSP: 002b:00007f74e39cc168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 352.164882][ T4896] RAX: ffffffffffffffda RBX: 00007f74e299c030 RCX: 00007f74e2889109 [ 352.164899][ T4896] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000005 [ 352.164914][ T4896] RBP: 00007f74e28e305d R08: 0000000000000000 R09: 0000000000000000 [ 352.164929][ T4896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 352.164943][ T4896] R13: 00007fff290a401f R14: 00007f74e39cc300 R15: 0000000000022000 [ 352.164982][ T4896] [ 352.164991][ T4896] memory: usage 1336kB, limit 0kB, failcnt 0 [ 352.165005][ T4896] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 352.165020][ T4896] Memory cgroup stats for /syz0: [ 352.165877][ T4896] anon 143360 [ 352.165877][ T4896] file 135168 [ 352.165877][ T4896] kernel 1089536 [ 352.165877][ T4896] kernel_stack 98304 [ 352.165877][ T4896] pagetables 77824 [ 352.165877][ T4896] percpu 0 [ 352.165877][ T4896] sock 0 [ 352.165877][ T4896] vmalloc 0 [ 352.165877][ T4896] shmem 131072 [ 352.165877][ T4896] zswap 0 [ 352.165877][ T4896] zswapped 0 [ 352.165877][ T4896] file_mapped 122880 [ 352.165877][ T4896] file_dirty 0 [ 352.165877][ T4896] file_writeback 0 [ 352.165877][ T4896] swapcached 0 [ 352.165877][ T4896] anon_thp 0 [ 352.165877][ T4896] file_thp 0 [ 352.165877][ T4896] shmem_thp 0 [ 352.165877][ T4896] inactive_anon 159744 [ 352.165877][ T4896] active_anon 114688 [ 352.165877][ T4896] inactive_file 4096 [ 352.165877][ T4896] active_file 0 [ 352.165877][ T4896] unevictable 0 [ 352.165877][ T4896] slab_reclaimable 109840 [ 352.165877][ T4896] slab_unreclaimable 773496 [ 352.165877][ T4896] slab 883336 [ 352.165978][ T4896] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4885,uid=0 [ 352.167299][ T4896] Memory cgroup out of memory: Killed process 4885 (syz-executor.0) total-vm:54640kB, anon-rss:428kB, file-rss:8944kB, shmem-rss:40kB, UID:0 pgtables:84kB oom_score_adj:1000 [ 352.581492][ T4841] syz-executor.0 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=0, oom_score_adj=0 [ 352.581526][ T4841] CPU: 1 PID: 4841 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-12183-g08c79c9cd67f #0 [ 352.581551][ T4841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.581562][ T4841] Call Trace: [ 352.581568][ T4841] [ 352.581576][ T4841] dump_stack_lvl+0xcd/0x134 [ 352.581606][ T4841] dump_header+0x10b/0x7f9 [ 352.581633][ T4841] oom_kill_process.cold+0x10/0x15 [ 352.581670][ T4841] out_of_memory+0x358/0x14a0 [ 352.581708][ T4841] ? find_held_lock+0x2d/0x110 [ 352.581739][ T4841] ? oom_killer_disable+0x270/0x270 [ 352.581774][ T4841] ? find_held_lock+0x2d/0x110 [ 352.581803][ T4841] mem_cgroup_out_of_memory+0x206/0x270 [ 352.581831][ T4841] ? mem_cgroup_margin+0x130/0x130 [ 352.581856][ T4841] ? lock_downgrade+0x6e0/0x6e0 [ 352.581908][ T4841] try_charge_memcg+0xef9/0x1380 [ 352.581947][ T4841] ? mem_cgroup_handle_over_high+0x510/0x510 [ 352.581978][ T4841] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 352.582008][ T4841] ? lock_downgrade+0x6e0/0x6e0 [ 352.582041][ T4841] ? lock_downgrade+0x6e0/0x6e0 [ 352.582071][ T4841] ? rcu_read_unlock+0x9/0x60 [ 352.582110][ T4841] obj_cgroup_charge+0x2ab/0x5e0 [ 352.582138][ T4841] ? kvmalloc_node+0x3e/0x190 [ 352.582250][ T4841] __kmalloc_node+0xa7/0x390 [ 352.582309][ T4841] kvmalloc_node+0x3e/0x190 [ 352.582338][ T4841] xt_alloc_table_info+0x3c/0xa0 [ 352.582409][ T4841] do_ipt_set_ctl+0x500/0xb80 [ 352.582484][ T4841] ? __mutex_lock+0x231/0x1350 [ 352.582519][ T4841] ? compat_do_replace.constprop.0+0x470/0x470 [ 352.582561][ T4841] ? wait_for_completion_io_timeout+0x20/0x20 [ 352.582615][ T4841] ? nf_sockopt_find.constprop.0+0x22d/0x2a0 [ 352.582675][ T4841] nf_setsockopt+0x83/0xe0 [ 352.582703][ T4841] ip_setsockopt+0x3c3/0x3ab0 [ 352.582759][ T4841] ? ip_sock_set_tos+0x30/0x30 [ 352.582780][ T4841] ? mark_lock.part.0+0xee/0x1910 [ 352.582806][ T4841] ? lock_chain_count+0x20/0x20 [ 352.582833][ T4841] ? aa_profile_af_perm+0x2e0/0x2e0 [ 352.582927][ T4841] ? lock_chain_count+0x20/0x20 [ 352.582952][ T4841] ? __vfree+0x3c/0xd0 [ 352.583013][ T4841] ? tcp_setsockopt+0x136/0x2520 [ 352.583034][ T4841] tcp_setsockopt+0x136/0x2520 [ 352.583069][ T4841] ? tcp_sock_set_keepidle+0x40/0x40 [ 352.583108][ T4841] ? aa_sk_perm+0x30f/0xaa0 [ 352.583135][ T4841] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 352.583169][ T4841] ? aa_af_perm+0x230/0x230 [ 352.583191][ T4841] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 352.583231][ T4841] ? sock_common_setsockopt+0x2b/0x100 [ 352.583293][ T4841] __sys_setsockopt+0x2db/0x6a0 [ 352.583316][ T4841] ? sock_common_recvmsg+0x190/0x190 [ 352.583341][ T4841] ? __ia32_sys_recv+0x100/0x100 [ 352.583364][ T4841] ? lock_downgrade+0x6e0/0x6e0 [ 352.583409][ T4841] __x64_sys_setsockopt+0xba/0x150 [ 352.583433][ T4841] ? syscall_enter_from_user_mode+0x21/0x70 [ 352.583460][ T4841] do_syscall_64+0x35/0xb0 [ 352.583488][ T4841] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 352.583516][ T4841] RIP: 0033:0x7f74e288a75a [ 352.583537][ T4841] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 352.583560][ T4841] RSP: 002b:00007fff290a3b88 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 352.583584][ T4841] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f74e288a75a [ 352.583600][ T4841] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 352.583614][ T4841] RBP: 00007fff290a3bb0 R08: 00000000000002d8 R09: ffffffff00000000 [ 352.583630][ T4841] R10: 00007f74e296e880 R11: 0000000000000202 R12: 00007fff290a3c10 [ 352.583652][ T4841] R13: 0000000000000003 R14: 00007fff290a3bac R15: 00007f74e296e820 [ 352.583689][ T4841] [ 352.619736][ T4841] memory: usage 1084kB, limit 0kB, failcnt 19 [ 352.619811][ T4841] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 352.619826][ T4841] Memory cgroup stats for /syz0: [ 352.620474][ T4841] anon 45056 [ 352.620474][ T4841] file 139264 [ 352.620474][ T4841] kernel 925696 [ 352.620474][ T4841] kernel_stack 0 [ 352.620474][ T4841] pagetables 8192 [ 352.620474][ T4841] percpu 0 [ 352.620474][ T4841] sock 0 [ 352.620474][ T4841] vmalloc 0 [ 352.620474][ T4841] shmem 131072 [ 352.620474][ T4841] zswap 0 [ 352.620474][ T4841] zswapped 0 [ 352.620474][ T4841] file_mapped 122880 [ 352.620474][ T4841] file_dirty 0 [ 352.620474][ T4841] file_writeback 0 [ 352.620474][ T4841] swapcached 0 [ 352.620474][ T4841] anon_thp 0 [ 352.620474][ T4841] file_thp 0 [ 352.620474][ T4841] shmem_thp 0 [ 352.620474][ T4841] inactive_anon 61440 [ 352.620474][ T4841] active_anon 114688 [ 352.620474][ T4841] inactive_file 4096 [ 352.620474][ T4841] active_file 4096 [ 352.620474][ T4841] unevictable 0 [ 352.620474][ T4841] slab_reclaimable 128088 [ 352.620474][ T4841] slab_unreclaimable 776832 [ 352.620474][ T4841] slab 904920 [ 352.620474][ T4841] workingset_refault_anon 0 [ 352.620601][ T4841] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=4841,uid=0 [ 352.628338][ T4841] Memory cgroup out of memory: Killed process 4841 (syz-executor.0) total-vm:50536kB, anon-rss:364kB, file-rss:8384kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 353.430070][ T42] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.790111][ T42] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.912328][ T42] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.012942][ T42] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.444273][ T42] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.497560][ T42] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.577032][ T42] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 354.626607][ T42] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 355.254773][ T49] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 355.265893][ T49] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 355.266946][ T49] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 355.268105][ T49] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 355.276342][ T49] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 355.283785][ T49] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 355.540217][ T4914] chnl_net:caif_netlink_parms(): no params data found [ 355.687636][ T4914] bridge0: port 1(bridge_slave_0) entered blocking state [ 355.687753][ T4914] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.703257][ T4914] device bridge_slave_0 entered promiscuous mode [ 355.716688][ T4914] bridge0: port 2(bridge_slave_1) entered blocking state [ 355.721460][ T4914] bridge0: port 2(bridge_slave_1) entered disabled state [ 355.722708][ T4914] device bridge_slave_1 entered promiscuous mode [ 355.862742][ T4914] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 355.866388][ T4914] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 355.910466][ T4914] team0: Port device team_slave_0 added [ 355.913004][ T4914] team0: Port device team_slave_1 added [ 355.969873][ T4914] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 355.969888][ T4914] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 355.969915][ T4914] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 355.972449][ T4914] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 355.972462][ T4914] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 355.972485][ T4914] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 356.070127][ T4914] device hsr_slave_0 entered promiscuous mode [ 356.079110][ T4914] device hsr_slave_1 entered promiscuous mode [ 356.079698][ T4914] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 356.079719][ T4914] Cannot create hsr debugfs directory [ 356.284492][ T4914] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.284564][ T4914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.285151][ T4914] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.285229][ T4914] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.438999][ T4914] 8021q: adding VLAN 0 to HW filter on device bond0 [ 356.456058][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 356.457026][ T4480] bridge0: port 1(bridge_slave_0) entered disabled state [ 356.467825][ T4480] bridge0: port 2(bridge_slave_1) entered disabled state [ 356.476030][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 356.502018][ T4914] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.524157][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 356.524736][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 356.525165][ T3663] bridge0: port 1(bridge_slave_0) entered blocking state [ 356.525219][ T3663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 356.526337][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 356.526895][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 356.527278][ T3663] bridge0: port 2(bridge_slave_1) entered blocking state [ 356.527329][ T3663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 356.548516][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 356.549365][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 356.550142][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 356.551179][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 356.551869][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 356.552521][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 356.553514][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 356.608800][ T3639] Bluetooth: hci0: Opcode 0x c03 failed: -110 [ 356.650281][ T4914] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 356.650305][ T4914] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 356.667468][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 356.668121][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 356.669482][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 356.669972][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 356.671590][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 356.677619][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 356.677740][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 356.685858][ T4914] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 357.149270][ T42] device hsr_slave_0 left promiscuous mode [ 357.166343][ T42] device hsr_slave_1 left promiscuous mode [ 357.167055][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 357.167087][ T42] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 357.169914][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 357.169938][ T42] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 357.182271][ T42] device bridge_slave_1 left promiscuous mode [ 357.182437][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.187127][ T42] device bridge_slave_0 left promiscuous mode [ 357.187255][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.208670][ T42] device hsr_slave_0 left promiscuous mode [ 357.209211][ T42] device hsr_slave_1 left promiscuous mode [ 357.209806][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 357.209853][ T42] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 357.212096][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 357.212118][ T42] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 357.222443][ T42] device bridge_slave_1 left promiscuous mode [ 357.222558][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.230639][ T42] device bridge_slave_0 left promiscuous mode [ 357.230759][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.247051][ T42] device hsr_slave_0 left promiscuous mode [ 357.248849][ T42] device hsr_slave_1 left promiscuous mode [ 357.249518][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 357.249555][ T42] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 357.251849][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 357.251874][ T42] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 357.274221][ T42] device bridge_slave_1 left promiscuous mode [ 357.274329][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 357.275896][ T42] device bridge_slave_0 left promiscuous mode [ 357.276025][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 357.318626][ T4480] Bluetooth: hci2: command 0x0409 tx timeout [ 357.343231][ T42] device veth1_macvtap left promiscuous mode [ 357.343296][ T42] device veth0_macvtap left promiscuous mode [ 357.343430][ T42] device veth1_vlan left promiscuous mode [ 357.343531][ T42] device veth0_vlan left promiscuous mode [ 357.346104][ T42] device veth1_macvtap left promiscuous mode [ 357.346173][ T42] device veth0_macvtap left promiscuous mode [ 357.346307][ T42] device veth1_vlan left promiscuous mode [ 357.346842][ T42] device veth0_vlan left promiscuous mode [ 357.363480][ T42] device veth1_macvtap left promiscuous mode [ 357.363534][ T42] device veth0_macvtap left promiscuous mode [ 357.363643][ T42] device veth1_vlan left promiscuous mode [ 357.363719][ T42] device veth0_vlan left promiscuous mode [ 358.056409][ T42] team0 (unregistering): Port device team_slave_1 removed [ 358.070177][ T42] team0 (unregistering): Port device team_slave_0 removed [ 358.075212][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 358.096081][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 358.162685][ T42] bond0 (unregistering): Released all slaves [ 358.293441][ T42] team0 (unregistering): Port device team_slave_1 removed [ 358.303921][ T42] team0 (unregistering): Port device team_slave_0 removed [ 358.317306][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 358.333911][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 358.401402][ T42] bond0 (unregistering): Released all slaves [ 358.575589][ T42] team0 (unregistering): Port device team_slave_1 removed [ 358.589669][ T42] team0 (unregistering): Port device team_slave_0 removed [ 358.606228][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 358.624391][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 358.717020][ T42] bond0 (unregistering): Released all slaves [ 359.023120][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 359.023784][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 359.054881][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 359.055604][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 359.056691][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 359.057235][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 359.084862][ T4914] device veth0_vlan entered promiscuous mode [ 359.093430][ T4914] device veth1_vlan entered promiscuous mode [ 359.123608][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 359.124255][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 359.124812][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 359.125386][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 359.132628][ T4914] device veth0_macvtap entered promiscuous mode [ 359.136501][ T4914] device veth1_macvtap entered promiscuous mode [ 359.156746][ T4914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 359.156766][ T4914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 359.156775][ T4914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 359.156788][ T4914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 359.156798][ T4914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 359.156811][ T4914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 359.158092][ T4914] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 359.158198][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 359.159591][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 359.160191][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 359.160788][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 359.173879][ T4914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 359.173898][ T4914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 359.173907][ T4914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 359.173921][ T4914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 359.173930][ T4914] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 359.173944][ T4914] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 359.175155][ T4914] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 359.175264][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 359.175943][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 359.363658][ T93] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 359.363676][ T93] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 359.365786][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 359.398858][ T3664] Bluetooth: hci2: command 0x041b tx timeout [ 359.440114][ T4093] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 359.440134][ T4093] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 359.448893][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 359.739771][ T49] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 359.741451][ T49] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 359.742119][ T49] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 359.743323][ T49] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 359.743815][ T49] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 359.744057][ T49] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 360.695298][ T5021] chnl_net:caif_netlink_parms(): no params data found [ 360.974370][ T5021] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.974428][ T5021] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.975824][ T5021] device bridge_slave_0 entered promiscuous mode [ 361.102098][ T5021] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.102161][ T5021] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.103288][ T5021] device bridge_slave_1 entered promiscuous mode [ 361.263504][ T5021] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 361.266000][ T5021] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 361.312065][ T5021] team0: Port device team_slave_0 added [ 361.314528][ T5021] team0: Port device team_slave_1 added [ 361.370838][ T5021] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 361.370853][ T5021] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 361.370879][ T5021] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 361.479010][ T4270] Bluetooth: hci2: command 0x040f tx timeout [ 361.538883][ T5021] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 361.538899][ T5021] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 361.538925][ T5021] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 361.622753][ T5021] device hsr_slave_0 entered promiscuous mode [ 361.642302][ T5021] device hsr_slave_1 entered promiscuous mode [ 361.798892][ T4270] Bluetooth: hci0: command 0x0409 tx timeout [ 361.955461][ T5021] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.955542][ T5021] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.955720][ T5021] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.955799][ T5021] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.985989][ T4270] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.986773][ T4270] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.243839][ T5021] 8021q: adding VLAN 0 to HW filter on device bond0 [ 362.266200][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.266849][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.283799][ T5021] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.300303][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.300942][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.301389][ T3663] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.301449][ T3663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.313767][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.314936][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.315359][ T3663] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.315416][ T3663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.328209][ T3663] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 362.345060][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 362.369827][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 362.371337][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 362.372170][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 362.393204][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 362.394178][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 362.414324][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 362.414959][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.429857][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 362.433873][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.493945][ T5021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 362.532914][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 362.533044][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 362.549591][ T5021] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 363.564761][ T4939] Bluetooth: hci2: command 0x0419 tx timeout [ 363.759011][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.759656][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.793566][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.794296][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.795164][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.795659][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.807818][ T5021] device veth0_vlan entered promiscuous mode [ 363.834399][ T5021] device veth1_vlan entered promiscuous mode [ 363.883181][ T3663] Bluetooth: hci0: command 0x041b tx timeout [ 363.913649][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 363.914316][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 363.914882][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.915446][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.926421][ T5021] device veth0_macvtap entered promiscuous mode [ 363.965260][ T5021] device veth1_macvtap entered promiscuous mode [ 363.998929][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 363.999697][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 364.031957][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.031977][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.031985][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.031999][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.032008][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.032021][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.032031][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 364.032045][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.037228][ T5021] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 364.037340][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 364.037973][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 364.043775][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 364.043796][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.043805][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 364.043819][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.043829][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 364.043842][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.043852][ T5021] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 364.043865][ T5021] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 364.059260][ T5021] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 364.059393][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 364.060063][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 364.366602][ T1348] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 364.366622][ T1348] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 364.369442][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 364.517666][ T1338] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 364.517688][ T1338] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 364.522346][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 365.964214][ T4270] Bluetooth: hci0: command 0x040f tx timeout [ 368.053927][ T3664] Bluetooth: hci0: command 0x0419 tx timeout 17:16:44 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) 17:16:44 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:16:44 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) [ 375.639228][ T3635] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 378.439048][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 378.439109][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 381.002421][ T3635] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 384.156901][ T3639] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 384.168279][ T3639] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 384.188711][ T3639] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 384.189503][ T3639] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 384.189999][ T3639] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 384.190265][ T3639] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 384.562467][ T5409] chnl_net:caif_netlink_parms(): no params data found [ 384.780068][ T5409] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.780130][ T5409] bridge0: port 1(bridge_slave_0) entered disabled state [ 384.781293][ T5409] device bridge_slave_0 entered promiscuous mode [ 384.783291][ T5409] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.783347][ T5409] bridge0: port 2(bridge_slave_1) entered disabled state [ 384.784507][ T5409] device bridge_slave_1 entered promiscuous mode [ 384.856781][ T5409] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 384.860348][ T5409] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 384.907247][ T5409] team0: Port device team_slave_0 added [ 384.911797][ T5409] team0: Port device team_slave_1 added [ 384.967917][ T5409] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 384.967934][ T5409] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 384.967976][ T5409] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 384.970685][ T5409] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 384.970698][ T5409] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 384.970722][ T5409] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 385.070843][ T5409] device hsr_slave_0 entered promiscuous mode [ 385.169344][ T5409] device hsr_slave_1 entered promiscuous mode [ 385.170105][ T5409] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 385.170128][ T5409] Cannot create hsr debugfs directory [ 385.472630][ T5409] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.472698][ T5409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.472872][ T5409] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.472946][ T5409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.577893][ T3664] bridge0: port 1(bridge_slave_0) entered disabled state [ 385.579095][ T3664] bridge0: port 2(bridge_slave_1) entered disabled state [ 385.677854][ T5409] 8021q: adding VLAN 0 to HW filter on device bond0 [ 385.779963][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 385.780563][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.785507][ T5409] 8021q: adding VLAN 0 to HW filter on device team0 [ 385.821439][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 385.822024][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 385.822428][ T4270] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.822491][ T4270] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.831095][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 385.831691][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 385.832114][ T4270] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.832170][ T4270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.861442][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 385.872084][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 385.901768][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 385.902998][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 385.903914][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 385.913390][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 385.914426][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 385.931763][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 385.932398][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 385.946769][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 385.947359][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 385.999508][ T5409] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 386.019850][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 386.019996][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 386.060711][ T5409] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 386.278538][ T3666] Bluetooth: hci3: command 0x0409 tx timeout [ 387.160760][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 387.161403][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 387.233914][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 387.234565][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 387.235407][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 387.235942][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 387.266253][ T5409] device veth0_vlan entered promiscuous mode [ 387.286502][ T5409] device veth1_vlan entered promiscuous mode [ 387.386312][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 387.388367][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 387.389662][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 387.390287][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 387.419283][ T5409] device veth0_macvtap entered promiscuous mode [ 387.439911][ T5409] device veth1_macvtap entered promiscuous mode [ 387.507679][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 387.507700][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.507708][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 387.507740][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.507750][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 387.507770][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.507779][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 387.507792][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.507801][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:17:02 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='kmem_cache_free\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x1fffffffffffff43, &(0x7f00000009c0)=ANY=[@ANYRESOCT], &(0x7f0000000a80)='GPL\x00', 0x80000000, 0x38, &(0x7f0000000340)=""/56, 0x41100, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x0, 0xfffffff8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) r2 = syz_clone(0x4904080, &(0x7f00000004c0)="9974471bb5355a1b4f661d69d8341fe11bed7f93b85b740d7e8b555fd3583a58f5ff106be6ae433345a00ec4ef225b26db964039d5c82b3290e51c4eca2c32f5b8e84623d485243e45eea3a1fae7dd5425c19b79c0b4459796c1453ca59c8c1f7857e65a91f4b62be39ff88cd7136f545c4549b50dc8600614", 0x79, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000540)="452c3852769154e4c0f7f84d2329b30a71800a82d014c018981edcff21e3a8a6a61ee5671311a2669e7fb3d737e5abbe246dc0fb3b28b1e55baeeedc030ab3ed2a7b132c3eeb80ec6836") perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x7f, 0x5, 0x80, 0x0, 0xdec, 0x200, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x5, 0x8}, 0x10042, 0x8, 0x5, 0x5, 0x71b0, 0x3, 0xfffc, 0x0, 0x7f, 0x0, 0x9}, r2, 0x3, 0xffffffffffffffff, 0x2) 17:17:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002300)="d8000000180081064e81f782db4cb904021d0800060a7c09e8fe55a10a0015000200142603000e120800a6d8783a0001a800080008000c00e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a502247eedab387476c98262f3d40fad95667e006dcdf63950b215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) 17:17:02 executing program 2: r0 = syz_clone(0x41000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000700650000850000006d0000008500000050000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x9, 0x5, 0x4, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3f}, r0, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:17:02 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:17:02 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) [ 387.507815][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:17:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002300)="d8000000180081064e81f782db4cb904021d0800060a7c09e8fe55a10a0015000200142603000e120800a6d8783a0001a800080008000c00e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a502247eedab387476c98262f3d40fad95667e006dcdf63950b215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 387.527423][ T5409] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 387.527558][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 387.528257][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 387.528933][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 387.529519][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 387.543407][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 387.543427][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.543436][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 387.543450][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.543459][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 17:17:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002300)="d8000000180081064e81f782db4cb904021d0800060a7c09e8fe55a10a0015000200142603000e120800a6d8783a0001a800080008000c00e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a502247eedab387476c98262f3d40fad95667e006dcdf63950b215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 387.543473][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.543482][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 17:17:03 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000002300)="d8000000180081064e81f782db4cb904021d0800060a7c09e8fe55a10a0015000200142603000e120800a6d8783a0001a800080008000c00e558f030035c3b61c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a502247eedab387476c98262f3d40fad95667e006dcdf63950b215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x6c00}, 0x0) [ 387.543495][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 387.543504][ T5409] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 387.543518][ T5409] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:17:03 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x3}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x81, 0xe2, 0x8, 0x0, 0x5, 0x10002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x45, 0x1}, 0x84606, 0x2, 0x3, 0x0, 0x2, 0x0, 0x8, 0x0, 0x4e8, 0x0, 0xd8}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_clone(0x0, &(0x7f0000000000)="4c489047b21afcfa73086b23fb3288c0e678", 0x12, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)="748a6eab793b0b0d4da1834b8f6dc3f925605179919b5790480fa973") r5 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x40, 0x2, 0xe4, 0x0, 0x2, 0x91088, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000480), 0xc}, 0x3200, 0x2, 0x3ff, 0x0, 0x7, 0xcdd2, 0x800, 0x0, 0x0, 0x0, 0x79ab}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xb1, 0x4, 0x39, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xadc, 0x0, @perf_config_ext={0xda, 0x3f}, 0x1c49a, 0x81, 0xfffffff9, 0x0, 0x109b, 0x4, 0x7, 0x0, 0x6, 0x0, 0x5}, r4, 0x10, r5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) [ 387.544871][ T5409] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 387.544986][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 387.545691][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 387.747496][ T1338] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 387.747514][ T1338] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 387.791739][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready 17:17:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) write$cgroup_int(r0, &(0x7f0000000000), 0xffe000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 387.910709][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 17:17:04 executing program 2: r0 = syz_clone(0x41000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000700650000850000006d0000008500000050000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x9, 0x5, 0x4, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3f}, r0, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 387.910729][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:17:04 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) [ 387.913706][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 387.997440][ T5513] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 388.359312][ T3666] Bluetooth: hci3: command 0x041b tx timeout [ 388.467803][ T5526] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 388.719679][ T5534] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 388.978582][ T5536] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 390.438514][ T4272] Bluetooth: hci3: command 0x040f tx timeout [ 392.519194][ T4272] Bluetooth: hci3: command 0x0419 tx timeout 17:17:23 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000680)='kmem_cache_free\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0x1fffffffffffff43, &(0x7f00000009c0)=ANY=[@ANYRESOCT], &(0x7f0000000a80)='GPL\x00', 0x80000000, 0x38, &(0x7f0000000340)=""/56, 0x41100, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x7, 0x0, 0xfffffff8}, 0x10, 0x0, r0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) r2 = syz_clone(0x4904080, &(0x7f00000004c0)="9974471bb5355a1b4f661d69d8341fe11bed7f93b85b740d7e8b555fd3583a58f5ff106be6ae433345a00ec4ef225b26db964039d5c82b3290e51c4eca2c32f5b8e84623d485243e45eea3a1fae7dd5425c19b79c0b4459796c1453ca59c8c1f7857e65a91f4b62be39ff88cd7136f545c4549b50dc8600614", 0x79, &(0x7f0000000040), &(0x7f0000000300), &(0x7f0000000540)="452c3852769154e4c0f7f84d2329b30a71800a82d014c018981edcff21e3a8a6a61ee5671311a2669e7fb3d737e5abbe246dc0fb3b28b1e55baeeedc030ab3ed2a7b132c3eeb80ec6836") perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x7f, 0x5, 0x80, 0x0, 0xdec, 0x200, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x2, @perf_config_ext={0x5, 0x8}, 0x10042, 0x8, 0x5, 0x5, 0x71b0, 0x3, 0xfffc, 0x0, 0x7f, 0x0, 0x9}, r2, 0x3, 0xffffffffffffffff, 0x2) 17:17:23 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) 17:17:23 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x3}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x81, 0xe2, 0x8, 0x0, 0x5, 0x10002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x45, 0x1}, 0x84606, 0x2, 0x3, 0x0, 0x2, 0x0, 0x8, 0x0, 0x4e8, 0x0, 0xd8}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_clone(0x0, &(0x7f0000000000)="4c489047b21afcfa73086b23fb3288c0e678", 0x12, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)="748a6eab793b0b0d4da1834b8f6dc3f925605179919b5790480fa973") r5 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x40, 0x2, 0xe4, 0x0, 0x2, 0x91088, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000480), 0xc}, 0x3200, 0x2, 0x3ff, 0x0, 0x7, 0xcdd2, 0x800, 0x0, 0x0, 0x0, 0x79ab}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xb1, 0x4, 0x39, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xadc, 0x0, @perf_config_ext={0xda, 0x3f}, 0x1c49a, 0x81, 0xfffffff9, 0x0, 0x109b, 0x4, 0x7, 0x0, 0x6, 0x0, 0x5}, r4, 0x10, r5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) 17:17:23 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x1c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) socket$kcm(0xa, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x890b, 0x0) 17:17:23 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000180), 0x4) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x3b6af0}], 0x1, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x17, &(0x7f0000000400)=[{&(0x7f0000000340)="4f15a39a2df43314ed5f2c578d4db055ee07f5a3d802cf8b50b4e7df21e18cb5fc59569f9e048c6343d4d93a8de61654aea60f37d00726bbbaf8413fa35f71028ebd6b86b0d049ac43de63ad10d251b4fdb14d20706d2b2b10384fce5ec562f80eea2946c9cfc7f1078325732582af6da35442dfadaacf63643c41a7e5f882e09016d46b27739751f7cb3c9747d087919a9ce3b13b0c9a2774a54d8d5a2c5053ac2eebb14cad", 0x203a0}, {&(0x7f0000000240)="ae61a8d192171409dc2c19809ce70f90c61b402d89906f876fbb89196fa57c9dd7ed6fe73d4a9a050d32416a7e622c1c9943ab02d4e7db1546fab943d95d0a7057459e2d58c83e7f97ddda47b3aff67efc92f873b90a00b5d3c8226357fc7dce76f9ccb0c757e1f3f3d77ab2c382b1f474dbfc9f", 0x3000000}], 0x47, &(0x7f0000000000), 0x0, 0xb9efff7f}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x10c2, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x9d, 0x0, 0x8, 0x0, 0x9, 0x7ff}, 0x0, 0x10, r2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000b00)={0x0, 0x80, 0x7, 0x6, 0x3f, 0x4, 0x0, 0x2, 0x60400, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2fe9, 0x3f}, 0xa000, 0x8, 0x0, 0x7, 0x3, 0x0, 0x6, 0x0, 0x9f, 0x0, 0x1245}, 0x0, 0x8, r3, 0x9) close(r0) 17:17:23 executing program 2: r0 = syz_clone(0x41000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000700650000850000006d0000008500000050000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x9, 0x5, 0x4, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x3f}, r0, 0x6, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:17:23 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x56, 0x0, 0x0, 0x24800000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r1, &(0x7f0000000180), 0xfdef) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r3, &(0x7f0000000000), 0x4000) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x14, 0x4, 0x4, 0x4d6}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r3, r2}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1800040000000000000000000800000097254000e0f7ffdf610407b2bb000040000000000000007765e09f0360", @ANYRES32, @ANYBLOB="000000000000000095000000000000be7946d379cbef3ce896aad2d5e38149bcbf316283f3b358caea8ab4fe48082e7f34f8c5cffbc2dc853fc85a0a52192e21eda4ac"], &(0x7f0000000240)='GPL\x00', 0x40, 0x0, 0x0, 0x41100, 0x1b, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.events\x00', 0x0, 0x0) 17:17:23 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x3}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x81, 0xe2, 0x8, 0x0, 0x5, 0x10002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x45, 0x1}, 0x84606, 0x2, 0x3, 0x0, 0x2, 0x0, 0x8, 0x0, 0x4e8, 0x0, 0xd8}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_clone(0x0, &(0x7f0000000000)="4c489047b21afcfa73086b23fb3288c0e678", 0x12, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)="748a6eab793b0b0d4da1834b8f6dc3f925605179919b5790480fa973") r5 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x40, 0x2, 0xe4, 0x0, 0x2, 0x91088, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000480), 0xc}, 0x3200, 0x2, 0x3ff, 0x0, 0x7, 0xcdd2, 0x800, 0x0, 0x0, 0x0, 0x79ab}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xb1, 0x4, 0x39, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xadc, 0x0, @perf_config_ext={0xda, 0x3f}, 0x1c49a, 0x81, 0xfffffff9, 0x0, 0x109b, 0x4, 0x7, 0x0, 0x6, 0x0, 0x5}, r4, 0x10, r5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) 17:17:24 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x25, 0x1, 0x0) close(r0) 17:17:24 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x2, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700), 0x0, 0x10, &(0x7f0000000740), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000b05d25a80258c63940d0424fc6004801d070a2f0007012e82c137153e370848018000f01707d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)='.\x00\x00\x000', 0x5}], 0x1}, 0x0) close(r0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 17:17:24 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x25, 0x1, 0x0) close(r0) [ 410.112290][ T5814] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:24 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x15, 0xa, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x0, 0x6, 0x0, 0x9}, 0x10}, 0x80) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b6c797}, 0x11020, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='9p_client_req\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 17:17:38 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000240)={0xffffffffffffffff, r1, 0x3}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x81, 0xe2, 0x8, 0x0, 0x5, 0x10002, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x45, 0x1}, 0x84606, 0x2, 0x3, 0x0, 0x2, 0x0, 0x8, 0x0, 0x4e8, 0x0, 0xd8}, 0x0, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_clone(0x0, &(0x7f0000000000)="4c489047b21afcfa73086b23fb3288c0e678", 0x12, &(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000440)="748a6eab793b0b0d4da1834b8f6dc3f925605179919b5790480fa973") r5 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x0, 0x40, 0x2, 0xe4, 0x0, 0x2, 0x91088, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000480), 0xc}, 0x3200, 0x2, 0x3ff, 0x0, 0x7, 0xcdd2, 0x800, 0x0, 0x0, 0x0, 0x79ab}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xb1, 0x4, 0x39, 0x1, 0x0, 0x2, 0x20, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xadc, 0x0, @perf_config_ext={0xda, 0x3f}, 0x1c49a, 0x81, 0xfffffff9, 0x0, 0x109b, 0x4, 0x7, 0x0, 0x6, 0x0, 0x5}, r4, 0x10, r5, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) 17:17:38 executing program 3: r0 = socket$kcm(0x2, 0x1, 0x84) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x3) 17:17:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x25, 0x1, 0x0) close(r0) 17:17:38 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x2, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700), 0x0, 0x10, &(0x7f0000000740), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000b05d25a80258c63940d0424fc6004801d070a2f0007012e82c137153e370848018000f01707d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)='.\x00\x00\x000', 0x5}], 0x1}, 0x0) close(r0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 17:17:38 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x15, 0xa, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x0, 0x6, 0x0, 0x9}, 0x10}, 0x80) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b6c797}, 0x11020, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='9p_client_req\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 17:17:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:38 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0x25, 0x1, 0x0) close(r0) 17:17:39 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b2a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00\x00 \x00\x00\x00\x00\x05\x00\x05\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') [ 424.303765][ T5831] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:39 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b2a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00\x00 \x00\x00\x00\x00\x05\x00\x05\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') 17:17:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x2, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700), 0x0, 0x10, &(0x7f0000000740), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000b05d25a80258c63940d0424fc6004801d070a2f0007012e82c137153e370848018000f01707d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)='.\x00\x00\x000', 0x5}], 0x1}, 0x0) close(r0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 17:17:39 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:39 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b2a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00\x00 \x00\x00\x00\x00\x05\x00\x05\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') 17:17:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:39 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)=0x2, 0x12) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000700), 0x0, 0x10, &(0x7f0000000740), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000b05d25a80258c63940d0424fc6004801d070a2f0007012e82c137153e370848018000f01707d1bd", 0x33fe0}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)='.\x00\x00\x000', 0x5}], 0x1}, 0x0) close(r0) bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 17:17:39 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:40 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b2a, &(0x7f0000000140)='wlan1\x00\x1b\x1a\xec\xb5\x12\x03F\xd9U\x02\x00\x00\x00 \x00\x00\x00\x00\x05\x00\x05\x00,C\xfdj\xe3\x8d\xe3\xd6\xe0|6l\xe9\xd9;\x13\xdf\xf7\xber\'\x8a\xd5\xd5\xe1\xf5\\\x9b\xb2\a\xde\xbbg\xc18\x84\xb5:f\xcb\xe8oO\x8dArYZ\xe1\x1f\xebp\xf5\xfb\xaad\x1a\xa0\xb1\x9c\xac\xe8\xff^9P\xee\x8aG\xd52\x0e\xd8\a\xca\xc8~\x82\xf6\xaaj\xe5\xf7\x19\xeb#;|\xabA1\xaa\xbc7Tf\xf1Y\x1c\xed~\xe9\xe9\xf9\xcfW0\x16\x9e2I[\xcf\xf7\xb0K\x1c\x1c\x06h\x8cd\f6\xfe\xb7\xbf\xae\xea\x99\xea\xb3G\xd5\x8c\x80\x907\x9f\x95\x86\"\x8a\x96\xf5\x19\xb6\x19\twp\xfa\xa9\xd8\xbfSa\xb9\v3\xb1\x05\xb9\xf93\xac6\xafXf\xfd\xde\x1e\x83\x7f\x80\xddL[t% /H\xed\xea\x80*NA\xbaX\r\xea\v\x83<\xa1\x05{\xc6lw\xd24\xfe\xd6\xa1SV\x03\x88eGXC^w\x11D\xce\r 5R+y\xc3Dew\xa4O\xfa\rc\x170\xdbA\xfe\xe9\xa7\xb3\x91\x88(\f8\x14\n;\xd8\x02\xa8\x135\x92\xf5\xe4JV\x0f\x10\xd7\x06\x86z\t\x13\xc2\xe5E\xc3\xf2Mb\xf0+\xed{y\xd7\xf2r\xc9\xcbVq\x01') 17:17:40 executing program 1: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={0x0, 0x5}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x0, 0x7f, 0x1, 0x0, 0x2, 0xd7c, 0x5, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000180)}, 0x88, 0xc6, 0x8, 0x4, 0x4, 0x7, 0x0, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x9) r4 = gettid() perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x4, 0x5, 0x0, 0x0, 0x0, 0x101, 0x800, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x49, 0x1, @perf_bp={&(0x7f0000000300), 0xf}, 0x10010, 0x7fffffffffffffff, 0x70, 0x2, 0xfff, 0x1, 0x4, 0x0, 0x9, 0x0, 0x8000}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='\x1e]:\x00') recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x91050}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:17:40 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x15, 0xa, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x0, 0x6, 0x0, 0x9}, 0x10}, 0x80) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b6c797}, 0x11020, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='9p_client_req\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 17:17:40 executing program 3: r0 = socket$kcm(0x2, 0x20000000002, 0x73) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) sendmsg$inet(r0, &(0x7f00000035c0)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f00000033c0)=[{&(0x7f0000000080)='r', 0x1}], 0x1}, 0x0) [ 425.437075][ T5860] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 17:17:40 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:40 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0xe5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x146a, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x0, 0x0, 0x1f, 0x3, 0x0, 0x0, 0x9, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, r1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0xa}, 0x14) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000440)='\xc7\xa9\xc8$\x9a)i\xcbi\xd7U\xe0\xb3n\xf4\xb90\x8d5\xd4AV\x02X5,\xb7d\xdcuQ\x042\xd9\x83\xee[\xa9\x97f\x05L3\xa5\x96j\x82t+\xd8\a\x01\xda\xa3l3\xa4\x97\f_\x94\x9cVjrB\x0e\xc7\x0e\x92W\xbfwD\xcc\x97J\x05\x15K\xe4\xb0\t\xf0:@\xd9\x83\xdb+\xae\xb4\xdd\xfc!/\xec\x95\x17\x0f\xc3\xbb\xb3\xcd\xa5\xe6\x99F\xe3&A\xc1\xf5\x19L\xe2\xf01\x9e\n\x19') r3 = socket$kcm(0xa, 0x2, 0x11) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r4, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={r0, r4, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001380)={&(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x8, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x80, 0x0}, 0x0) setsockopt$sock_attach_bpf(r3, 0x29, 0x2e, &(0x7f0000000040), 0x52d) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0xfc, 0x0, 0x5, 0x0, 0x0, 0x80000001, 0x10580, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext, 0x10, 0x0, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xffd}, 0x0, 0x0, 0xffffffffffffffff, 0xc) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0xffffffff, 0x8001}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000040)=r5, 0x4) 17:17:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 17:17:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x0, 0x1653}, 0x10}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) 17:17:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 425.877534][ T5887] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 17:17:40 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x4, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1779}, 0x0, 0x3, r2, 0x9) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x5f, 0x62, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0xcc57, 0xffff, 0x4, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x8, 0x1f, 0x0, 0xa05, 0x8408, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffc0, 0x1, @perf_config_ext={0x0, 0x1e4b3381}, 0x0, 0x0, 0x10, 0x0, 0x3f, 0xe2a, 0x0, 0x0, 0x2, 0x0, 0x53}, 0x0, 0xd, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 17:17:40 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x6, 0x61, 0x0, 0x10}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) 17:17:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 426.067813][ T5892] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 17:17:41 executing program 4: bpf$ENABLE_STATS(0x20, &(0x7f0000000300), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x100, 0x2, 0x0, 0x110, 0x1, 0x110, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='freezer.state\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) [ 426.281262][ T5897] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 17:17:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1d, &(0x7f0000000200), 0x4) 17:17:41 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x15, 0xa, 0x0, 0x0, 0xff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480)={0x0, 0x6, 0x0, 0x9}, 0x10}, 0x80) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4b6c797}, 0x11020, 0x0, 0x20, 0x0, 0x0, 0x0, 0x7, 0x0, 0x6, 0x0, 0xffffffffffffffff}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000300)='9p_client_req\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0x806000) 17:17:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 17:17:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1d, &(0x7f0000000200), 0x4) 17:17:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x0, 0x1653}, 0x10}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) [ 426.591088][ T5903] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 17:17:41 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) 17:17:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1d, &(0x7f0000000200), 0x4) 17:17:41 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x1, 0x0, 0xfc, 0x9, 0x0, 0x0, 0x62004, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x401}, 0x5, 0x100, 0x2, 0x0, 0x0, 0x2b31, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x3, 0xfd, 0x9, 0x9, 0x0, 0x20000000000000, 0x800, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x10800, 0x5, 0x9, 0x2, 0x9, 0x5, 0x8, 0x0, 0x4}, 0x0, 0x10, r3, 0x8) r4 = gettid() r5 = openat$cgroup_ro(r2, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=r4, 0xfdaa) write$cgroup_int(r3, &(0x7f0000000200)=0x880300, 0x806000) 17:17:41 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x4, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1779}, 0x0, 0x3, r2, 0x9) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x5f, 0x62, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0xcc57, 0xffff, 0x4, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x8, 0x1f, 0x0, 0xa05, 0x8408, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffc0, 0x1, @perf_config_ext={0x0, 0x1e4b3381}, 0x0, 0x0, 0x10, 0x0, 0x3f, 0xe2a, 0x0, 0x0, 0x2, 0x0, 0x53}, 0x0, 0xd, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 17:17:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x1d, &(0x7f0000000200), 0x4) 17:17:42 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000200000095"], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x3, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 17:17:42 executing program 4: bpf$ENABLE_STATS(0x20, &(0x7f0000000300), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x100, 0x2, 0x0, 0x110, 0x1, 0x110, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='freezer.state\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 17:17:42 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xa, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x6}, @alu={0x0, 0x1}, @generic={0x3, 0xd, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1e, 0x9, 0x800, 0x8, 0x200, 0xffffffffffffffff, 0x46f2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x7, 0x0, 0x5, 0x0, 0x810, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xa, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, 0x0, 0x2, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0x1, r0]}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x80, 0x33, 0xc0, 0x0, 0x0, 0x0, 0x3, 0x14481, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xda, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0xc8a0, 0x981, 0x80}, 0x0, 0xe, r2, 0x9) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x1, 0x5, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x715, 0x1, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x40020000000204) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) 17:17:42 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x0, 0x1653}, 0x10}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) 17:17:42 executing program 2: syz_clone(0x15820080, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x0, 0x80, 0x0, 0x1, 0x2, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_bp={0x0, 0xf}, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xe, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) 17:17:42 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x1, 0x0, 0xfc, 0x9, 0x0, 0x0, 0x62004, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x401}, 0x5, 0x100, 0x2, 0x0, 0x0, 0x2b31, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x3, 0xfd, 0x9, 0x9, 0x0, 0x20000000000000, 0x800, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x10800, 0x5, 0x9, 0x2, 0x9, 0x5, 0x8, 0x0, 0x4}, 0x0, 0x10, r3, 0x8) r4 = gettid() r5 = openat$cgroup_ro(r2, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=r4, 0xfdaa) write$cgroup_int(r3, &(0x7f0000000200)=0x880300, 0x806000) 17:17:42 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x0, 0x4, 0x0, 0x89, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/103, &(0x7f0000000600), &(0x7f0000001b40), 0x80, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000002c0)="3d6ee2e04b91ab10143d9abe05dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:17:43 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x1, 0x0, 0xfc, 0x9, 0x0, 0x0, 0x62004, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x401}, 0x5, 0x100, 0x2, 0x0, 0x0, 0x2b31, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x3, 0xfd, 0x9, 0x9, 0x0, 0x20000000000000, 0x800, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x10800, 0x5, 0x9, 0x2, 0x9, 0x5, 0x8, 0x0, 0x4}, 0x0, 0x10, r3, 0x8) r4 = gettid() r5 = openat$cgroup_ro(r2, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=r4, 0xfdaa) write$cgroup_int(r3, &(0x7f0000000200)=0x880300, 0x806000) 17:17:43 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x0, 0x4, 0x0, 0x89, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/103, &(0x7f0000000600), &(0x7f0000001b40), 0x80, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000002c0)="3d6ee2e04b91ab10143d9abe05dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:17:43 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x4, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1779}, 0x0, 0x3, r2, 0x9) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x5f, 0x62, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0xcc57, 0xffff, 0x4, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x8, 0x1f, 0x0, 0xa05, 0x8408, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffc0, 0x1, @perf_config_ext={0x0, 0x1e4b3381}, 0x0, 0x0, 0x10, 0x0, 0x3f, 0xe2a, 0x0, 0x0, 0x2, 0x0, 0x53}, 0x0, 0xd, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 17:17:43 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x0, 0x4, 0x0, 0x89, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/103, &(0x7f0000000600), &(0x7f0000001b40), 0x80, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000002c0)="3d6ee2e04b91ab10143d9abe05dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:17:43 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xa, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x6}, @alu={0x0, 0x1}, @generic={0x3, 0xd, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1e, 0x9, 0x800, 0x8, 0x200, 0xffffffffffffffff, 0x46f2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x7, 0x0, 0x5, 0x0, 0x810, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xa, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, 0x0, 0x2, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0x1, r0]}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x80, 0x33, 0xc0, 0x0, 0x0, 0x0, 0x3, 0x14481, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xda, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0xc8a0, 0x981, 0x80}, 0x0, 0xe, r2, 0x9) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x1, 0x5, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x715, 0x1, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x40020000000204) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) 17:17:43 executing program 3: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x1, 0x0, 0xfc, 0x9, 0x0, 0x0, 0x62004, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0x401}, 0x5, 0x100, 0x2, 0x0, 0x0, 0x2b31, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000100)='syzkaller\x00'}, 0x30) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x3, 0xfd, 0x9, 0x9, 0x0, 0x20000000000000, 0x800, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x10800, 0x5, 0x9, 0x2, 0x9, 0x5, 0x8, 0x0, 0x4}, 0x0, 0x10, r3, 0x8) r4 = gettid() r5 = openat$cgroup_ro(r2, &(0x7f0000000080)='io.stat\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000100)=r4, 0xfdaa) write$cgroup_int(r3, &(0x7f0000000200)=0x880300, 0x806000) 17:17:44 executing program 2: bpf$ENABLE_STATS(0x20, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x0, 0x4, 0x0, 0x89, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000000c0)={0x0, &(0x7f0000000000)=""/103, &(0x7f0000000600), &(0x7f0000001b40), 0x80, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000002c0)="3d6ee2e04b91ab10143d9abe05dd", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 17:17:44 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000200)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x0, 0x1, 0x0, 0x1653}, 0x10}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='blkio.bfq.dequeue\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) 17:17:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa278b25db4cb904e473730e55cff26d1b0e001d00090000005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) recvmsg$kcm(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/171, 0xab}], 0x2}, 0x0) 17:17:44 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xa, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x6}, @alu={0x0, 0x1}, @generic={0x3, 0xd, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1e, 0x9, 0x800, 0x8, 0x200, 0xffffffffffffffff, 0x46f2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x7, 0x0, 0x5, 0x0, 0x810, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xa, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, 0x0, 0x2, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0x1, r0]}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x80, 0x33, 0xc0, 0x0, 0x0, 0x0, 0x3, 0x14481, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xda, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0xc8a0, 0x981, 0x80}, 0x0, 0xe, r2, 0x9) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x1, 0x5, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x715, 0x1, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x40020000000204) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) 17:17:44 executing program 4: bpf$ENABLE_STATS(0x20, &(0x7f0000000300), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x100, 0x2, 0x0, 0x110, 0x1, 0x110, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='freezer.state\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 17:17:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x4, 0x3f, 0x7, 0xc, 0x0, 0x0, 0x8a010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6f8, 0x2, @perf_config_ext={0x0, 0x29}, 0x80, 0x0, 0x9, 0x6, 0x4, 0x3, 0xaa5, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x6, 0x7f, 0x4, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x8}, 0x0, 0x2f4, 0x80000001, 0x2, 0xebd, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='8'], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x67c20000}, 0x0) [ 430.132283][ T5965] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 430.132623][ T5965] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 17:17:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x9, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x287b361ae6c523fa, 0x10, &(0x7f0000000000), 0x128}, 0x48) [ 430.132830][ T5963] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 430.133479][ T5963] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 17:17:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x9, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x287b361ae6c523fa, 0x10, &(0x7f0000000000), 0x128}, 0x48) 17:17:45 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000640)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3ff}, 0x0, 0x0, 0x0, 0x4, 0x1, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x1779}, 0x0, 0x3, r2, 0x9) r3 = perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x5f, 0x62, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0xcc57, 0xffff, 0x4, 0x0, 0x8, 0x0, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x8, 0x1f, 0x0, 0xa05, 0x8408, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffc0, 0x1, @perf_config_ext={0x0, 0x1e4b3381}, 0x0, 0x0, 0x10, 0x0, 0x3f, 0xe2a, 0x0, 0x0, 0x2, 0x0, 0x53}, 0x0, 0xd, r3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 17:17:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x9, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x287b361ae6c523fa, 0x10, &(0x7f0000000000), 0x128}, 0x48) 17:17:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x9, 0x1, 0x8c}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x287b361ae6c523fa, 0x10, &(0x7f0000000000), 0x128}, 0x48) 17:17:45 executing program 2: socketpair(0xa, 0x0, 0x4081, &(0x7f0000000880)) 17:17:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x4, 0x3f, 0x7, 0xc, 0x0, 0x0, 0x8a010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6f8, 0x2, @perf_config_ext={0x0, 0x29}, 0x80, 0x0, 0x9, 0x6, 0x4, 0x3, 0xaa5, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x6, 0x7f, 0x4, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x8}, 0x0, 0x2f4, 0x80000001, 0x2, 0xebd, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='8'], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x67c20000}, 0x0) 17:17:45 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x0, 0x7f, 0x1, 0x0, 0x0, 0xd7c, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000180)}, 0x88, 0x0, 0x8, 0x4, 0x4, 0x7, 0x0, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x9) r3 = gettid() perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x91050}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:17:45 executing program 0: perf_event_open(&(0x7f0000000740)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000300)=0xf6) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x41, 0x0, 0x0, 0x0, 0x1a2aaf20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305828, &(0x7f0000000040)) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x6, 0x400, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xacb, 0x9, 0x9, 0x0, 0x12c00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f00000002c0)='cpuacct.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x7, 0x9, 0x0, 0x40, 0x0, 0x0, 0x10235, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x2, @perf_bp={&(0x7f0000000380)}, 0x100, 0x5, 0x9, 0x4, 0x7, 0x8, 0x4, 0x0, 0x9, 0x0, 0xcc}, 0xffffffffffffffff, 0x3, r2, 0x9) write$cgroup_type(r0, &(0x7f0000000000), 0x42000) perf_event_open(&(0x7f0000000840)={0x3, 0x80, 0x2, 0x3, 0x9, 0x8, 0x0, 0x2146, 0x40, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x67e, 0x4, @perf_config_ext={0x1000, 0x3}, 0x41000, 0x9, 0x6, 0x0, 0xffffffff, 0xfb8, 0x5, 0x0, 0x10000, 0x0, 0x2}, 0x0, 0xffffffffffffffff, r4, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffcca}, 0x48) 17:17:46 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a80)={0x6, 0xa, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x6}, @alu={0x0, 0x1}, @generic={0x3, 0xd, 0xc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, 0x0, 0x7, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=@base={0x1e, 0x9, 0x800, 0x8, 0x200, 0xffffffffffffffff, 0x46f2, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x5}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x7, 0x0, 0x5, 0x0, 0x810, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0xa, 0x4, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7}, [@func={0x85, 0x0, 0x1, 0x0, 0x3}]}, 0x0, 0x2, 0xd, &(0x7f0000000140)=""/13, 0x41100, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x1, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0x1, r0]}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) r2 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001780)={0x1, 0x80, 0x33, 0xc0, 0x0, 0x0, 0x0, 0x3, 0x14481, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xda, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0xc8a0, 0x981, 0x80}, 0x0, 0xe, r2, 0x9) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x1, 0x5, 0x0, 0x9, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x2, 0x715, 0x1, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)=0x40020000000204) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r1}, 0x8) 17:17:46 executing program 4: bpf$ENABLE_STATS(0x20, &(0x7f0000000300), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x100, 0x2, 0x0, 0x110, 0x1, 0x110, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='freezer.state\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 17:17:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x4, 0x3f, 0x7, 0xc, 0x0, 0x0, 0x8a010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6f8, 0x2, @perf_config_ext={0x0, 0x29}, 0x80, 0x0, 0x9, 0x6, 0x4, 0x3, 0xaa5, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x6, 0x7f, 0x4, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x8}, 0x0, 0x2f4, 0x80000001, 0x2, 0xebd, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='8'], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x67c20000}, 0x0) 17:17:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:17:46 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="70de9d93eaf8acf5d0ab9e180674d50b6412bf6c900931053e7fa77823a7af2d42", 0x21}], 0x1}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000300)='gre0\x00') 17:17:46 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/cgroup\x00') ioctl$TUNGETDEVNETNS(r0, 0xb702, 0x0) 17:17:46 executing program 5: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff30, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e030029000b0ad25a80648c6394f90224fc60100003400c000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 17:17:46 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:17:46 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x0, 0x7f, 0x1, 0x0, 0x0, 0xd7c, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000180)}, 0x88, 0x0, 0x8, 0x4, 0x4, 0x7, 0x0, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x9) r3 = gettid() perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x91050}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:17:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x4, 0x3f, 0x7, 0xc, 0x0, 0x0, 0x8a010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6f8, 0x2, @perf_config_ext={0x0, 0x29}, 0x80, 0x0, 0x9, 0x6, 0x4, 0x3, 0xaa5, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x6, 0x7f, 0x4, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x8}, 0x0, 0x2f4, 0x80000001, 0x2, 0xebd, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='8'], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x67c20000}, 0x0) [ 431.942211][ T6015] netlink: 'syz-executor.5': attribute type 11 has an invalid length. [ 431.942234][ T6015] netlink: 181912 bytes leftover after parsing attributes in process `syz-executor.5'. 17:17:46 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f0000000480)=@framed={{}, [@jmp={0x5, 0x1, 0xa, 0xa}]}, &(0x7f0000000440)='GPL\x00', 0x1, 0xeb, &(0x7f0000000680)=""/235, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:17:46 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x14, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000038000911d25a80648c63940d0124fc602f6e35400c0002000200006837153e370a00018025641d00d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 432.405265][ T6027] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 17:17:47 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:17:47 executing program 3: socketpair(0x1d, 0x3, 0x1, &(0x7f0000000040)) 17:17:47 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="1700000015008108e00212ba0d8105040a000c00030f06", 0x17}], 0x1}, 0x0) 17:17:47 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 17:17:47 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x0, 0x7f, 0x1, 0x0, 0x0, 0xd7c, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000180)}, 0x88, 0x0, 0x8, 0x4, 0x4, 0x7, 0x0, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x9) r3 = gettid() perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x91050}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:17:47 executing program 3: socketpair(0x1d, 0x3, 0x1, &(0x7f0000000040)) 17:17:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r0, 0x4020940d, 0x20000000) 17:17:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r0, 0x4020940d, 0x20000000) [ 433.098398][ T6027] device 0 entered promiscuous mode 17:17:47 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x14, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000038000911d25a80648c63940d0124fc602f6e35400c0002000200006837153e370a00018025641d00d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 17:17:47 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xc, 0x4, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="8dd71a5e1c094da4d019afb33033", 0x0, 0x10000, 0x0, 0x0, 0x4b, &(0x7f0000000000), &(0x7f0000001300)="293e07d15a352b2e14f4767ed316a184956156bbbc705b4804d2c7e2f1481b49c6b49b73ee5b6c9fcb721d42440b448cf6aa22cd129a9269fbc1f7d2f749dba24a79eafffe3978aced77d969c7ea29703f3eb4ac23bff60b5032e17be7d73e513b130a0dbb74b9c2c3f38b4178c045bd7f5ffeb689ec8c9d300051cf98fb67bd0d2ceb021f2fdf2143"}, 0x28) 17:17:47 executing program 3: socketpair(0x1d, 0x3, 0x1, &(0x7f0000000040)) 17:17:47 executing program 0: socketpair(0x29, 0x80002, 0x0, &(0x7f0000000000)) 17:17:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r0, 0x4020940d, 0x20000000) 17:17:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNDETACHFILTER(r0, 0x4020940d, 0x20000000) 17:17:48 executing program 3: socketpair(0x1d, 0x3, 0x1, &(0x7f0000000040)) 17:17:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x27, 0x0, 0x0, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r0, 0x0, 0x0, 0x0}, 0x30) r2 = perf_event_open(0x0, r1, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x89, 0x40, 0x0, 0x0, 0x2, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xcfe, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x8000, 0x6, 0x2, 0x5, 0x100, 0x9, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r2, 0x8) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)=0xee85000000000000) syz_clone(0x0, &(0x7f0000000180)="171e90f4bee77186e13dd53cd120a2c8a42caf4a13dad8", 0x17, &(0x7f0000000040), 0x0, 0x0) [ 433.323148][ T6054] netlink: 'syz-executor.5': attribute type 2 has an invalid length. [ 433.606622][ T6054] device 1 entered promiscuous mode 17:17:48 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x1, 0x0, 0x7f, 0x1, 0x0, 0x0, 0xd7c, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000180)}, 0x88, 0x0, 0x8, 0x4, 0x4, 0x7, 0x0, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x0, r0, 0x9) r3 = gettid() perf_event_open(0x0, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) recvmsg(r1, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x91050}], 0x1}, 0x1f00) sendmsg$tipc(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:17:48 executing program 4: syz_clone(0xaa281000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:17:48 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2) recvmsg$kcm(r0, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, 0x2) 17:17:48 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000018310000050000000000000000000000851000000700"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x5, 0x0, 0x7fff, 0x1656}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x400, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x4, 0x4, 0x0, 0x0, 0x0, 0x4, 0x13, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000240)}, 0x0, 0x8, 0xff000000, 0xc, 0xfffffffffffffff8, 0x6, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={@map}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x40020000000204) r3 = syz_clone(0x24040000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d7d86198b752b14c2230ae7b541e5a00c485020b0de92970da") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r3, 0x12) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) 17:17:48 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x14, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000038000911d25a80648c63940d0124fc602f6e35400c0002000200006837153e370a00018025641d00d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 17:17:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x27, 0x0, 0x0, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r0, 0x0, 0x0, 0x0}, 0x30) r2 = perf_event_open(0x0, r1, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x89, 0x40, 0x0, 0x0, 0x2, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xcfe, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x8000, 0x6, 0x2, 0x5, 0x100, 0x9, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r2, 0x8) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)=0xee85000000000000) syz_clone(0x0, &(0x7f0000000180)="171e90f4bee77186e13dd53cd120a2c8a42caf4a13dad8", 0x17, &(0x7f0000000040), 0x0, 0x0) [ 433.785928][ T6074] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 17:17:48 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2) recvmsg$kcm(r0, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, 0x2) 17:17:48 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000fefffe7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010100000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000c9be17044171e1d3d7b196d079c4d4758fa35d17c668a4b63e069efb29797573b8530e31ec24925095a163b9d4e76be266e31a80212240baa44e080addde36e5fdc6c42a7b3f912f6906a6e2313091dd61258a1fda45991fbdce6793c8a4785ee8b60092659b941bbd694d1f8898b3e6"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000630277", 0x0, 0x100, 0x6000000000000000}, 0x28) 17:17:48 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x27, 0x0, 0x0, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r0, 0x0, 0x0, 0x0}, 0x30) r2 = perf_event_open(0x0, r1, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x89, 0x40, 0x0, 0x0, 0x2, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xcfe, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x8000, 0x6, 0x2, 0x5, 0x100, 0x9, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r2, 0x8) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)=0xee85000000000000) syz_clone(0x0, &(0x7f0000000180)="171e90f4bee77186e13dd53cd120a2c8a42caf4a13dad8", 0x17, &(0x7f0000000040), 0x0, 0x0) 17:17:49 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2) recvmsg$kcm(r0, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, 0x2) 17:17:49 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) [ 434.619694][ T6074] device 2 entered promiscuous mode 17:17:49 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000018310000050000000000000000000000851000000700"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x5, 0x0, 0x7fff, 0x1656}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x400, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x4, 0x4, 0x0, 0x0, 0x0, 0x4, 0x13, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000240)}, 0x0, 0x8, 0xff000000, 0xc, 0xfffffffffffffff8, 0x6, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={@map}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x40020000000204) r3 = syz_clone(0x24040000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d7d86198b752b14c2230ae7b541e5a00c485020b0de92970da") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r3, 0x12) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) 17:17:49 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000016c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 17:17:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) r1 = getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x27, 0x0, 0x0, 0x1, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x2}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={r1, r0, 0x0, 0x0, 0x0}, 0x30) r2 = perf_event_open(0x0, r1, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x89, 0x40, 0x0, 0x0, 0x2, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xcfe, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x8000, 0x6, 0x2, 0x5, 0x100, 0x9, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r2, 0x8) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)=0xee85000000000000) syz_clone(0x0, &(0x7f0000000180)="171e90f4bee77186e13dd53cd120a2c8a42caf4a13dad8", 0x17, &(0x7f0000000040), 0x0, 0x0) 17:17:49 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x14, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000038000911d25a80648c63940d0124fc602f6e35400c0002000200006837153e370a00018025641d00d1bd", 0x2e}], 0x1}, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 17:17:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'ip6erspan0\x00', 0x2}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000080)=0x1) [ 434.859032][ T6102] netlink: 'syz-executor.5': attribute type 2 has an invalid length. 17:17:49 executing program 3: r0 = socket$kcm(0x11, 0xa, 0x300) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x6, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000002000000000000000000001e95"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x2) recvmsg$kcm(r0, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, 0x2) 17:17:50 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='9p_client_req\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1700, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000002c0)}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x5, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x2, &(0x7f0000000180)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x80, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r1, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 435.457590][ T6102] device 3 entered promiscuous mode 17:17:50 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0xc, &(0x7f0000000300)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc82a}, @ldst={0x1, 0x0, 0x0, 0xd, 0xb, 0x18}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}]}, 0x0, 0x3, 0x95, &(0x7f00000003c0)=""/149, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xf, 0x7f, 0x3ff}, 0x10, r2, r1}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600), 0x8) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:17:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 17:17:50 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x34000000, 0x36006) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 17:17:50 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000018310000050000000000000000000000851000000700"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x5, 0x0, 0x7fff, 0x1656}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x400, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x4, 0x4, 0x0, 0x0, 0x0, 0x4, 0x13, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000240)}, 0x0, 0x8, 0xff000000, 0xc, 0xfffffffffffffff8, 0x6, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={@map}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x40020000000204) r3 = syz_clone(0x24040000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d7d86198b752b14c2230ae7b541e5a00c485020b0de92970da") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r3, 0x12) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) [ 439.871833][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.871884][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 477.719007][ T4939] Bluetooth: hci2: command 0x0406 tx timeout [ 482.855119][ T4272] Bluetooth: hci0: command 0x0406 tx timeout 17:18:43 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:18:43 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0xe, 0xfffff000, &(0x7f0000000080)="08a8699cca08eec82cbab38baee7", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) 17:18:43 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='9p_client_req\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1700, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000002c0)}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x5, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x2, &(0x7f0000000180)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x80, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r1, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:18:43 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 17:18:43 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000080095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x100a, &(0x7f00000023c0)=""/4106, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000780)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x18, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="000000000000000018310000050000000000000000000000851000000700"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000c40)={0x5, 0x0, 0x7fff, 0x1656}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff]}, 0x80) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x400, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x6, 0x4, 0x4, 0x0, 0x0, 0x0, 0x4, 0x13, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000240)}, 0x0, 0x8, 0xff000000, 0xc, 0xfffffffffffffff8, 0x6, 0xffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x4, r1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x3e7, &(0x7f0000000e00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~I\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80V\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbdQ\x01\xe3&\x16\xb7V\x92\x86\xc1O$\xfd\x9d\x0f\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef~\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x1f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccffFz\xa8\t\xe4+\x83\xac\x94\xb1\xdc\x04?\xc84&q\x8b\x02\x00\x00\x00\xa5r\x98c\x91\xe7\x85\xa3\xd2\x1cDH{;\x91c+\xf4\xf0\b7\xbeH\'\xd8\x02\xcd\xc8k\xb5\x88\x1d\x1c\x846\\\'5\x15j\x03\f\xa3\xd1\xc4g\x02mP{\xe1S?\x98SI2\xd4\xd0G\xbf~\x00\xad\x01\x80\xbe\xfd\x86\xf7\xa7\xeb\x89\xf6\xde\x81\xff\x06\x1b\xa0\xcc\xea_-\x87\x85\x1e>\xdcB\xe0\xbc;!0\xab^\x8fx@W\xf8b\x12\xa5\xb4\xc6\xbbA\xed\x15{\xb7\x98o\xb9wdkzp\x15\xeae\xb1D\x0e\xfd\x12\xf6I\xb69\x9d1\x05\xfd\x9dvmp\xcc!\xde\x1b}\xa6\xc1\x03\xcb-\xa8\xde\x8dD%\xae\t\x1e\x91\x13\xdds\xf5\x8d\x9c\x13\xfb\x875!\x83A7eEB\xcd_\x1a\xb1\x91q\xe9\xb7\xdb\x03\x8e~8\x8cH\xaae\x96\xd8\xec\n\x0ft\x9b|\xda\xd4\xe49\x01,\xdf\xce\x00\xe6\x99\xb2\vu\xca\t\xe6\x0fBK\xe5]\xec\xff\xaf \xb3jc\xc0\x977<\x92\x977\xb4\xd9\xe7q\xfau\xb2\x7f\x9e\x1f\x81\xd09/\xb6\x06\x9co\t\x02\xaa\x92\x88\x00'/1015}, 0x82) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000008c0)={@map}, 0x14) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)=0x40020000000204) r3 = syz_clone(0x24040000, &(0x7f0000000000), 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="d7d86198b752b14c2230ae7b541e5a00c485020b0de92970da") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r3, 0x12) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) 17:18:44 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0xe, 0xfffff000, &(0x7f0000000080)="08a8699cca08eec82cbab38baee7", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) 17:18:44 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='9p_client_req\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1700, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000002c0)}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x5, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x2, &(0x7f0000000180)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x80, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r1, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 17:18:44 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) [ 490.315901][ T4093] device hsr_slave_0 left promiscuous mode [ 490.316501][ T4093] device hsr_slave_1 left promiscuous mode [ 490.317249][ T4093] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 490.317283][ T4093] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 490.330300][ T4093] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 490.330328][ T4093] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 490.352937][ T4093] device bridge_slave_1 left promiscuous mode [ 490.353087][ T4093] bridge0: port 2(bridge_slave_1) entered disabled state [ 490.389778][ T4093] device bridge_slave_0 left promiscuous mode [ 490.389909][ T4093] bridge0: port 1(bridge_slave_0) entered disabled state [ 490.432997][ T4093] device veth1_macvtap left promiscuous mode [ 490.433054][ T4093] device veth0_macvtap left promiscuous mode [ 490.433165][ T4093] device veth1_vlan left promiscuous mode [ 490.433244][ T4093] device veth0_vlan left promiscuous mode [ 490.799461][ T4093] team0 (unregistering): Port device team_slave_1 removed [ 490.804708][ T4093] team0 (unregistering): Port device team_slave_0 removed [ 490.823399][ T4093] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 490.831505][ T4093] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 490.905693][ T4093] bond0 (unregistering): Released all slaves 17:18:45 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0xe, 0xfffff000, &(0x7f0000000080)="08a8699cca08eec82cbab38baee7", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) 17:18:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 17:18:45 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0xc, &(0x7f0000000300)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc82a}, @ldst={0x1, 0x0, 0x0, 0xd, 0xb, 0x18}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}]}, 0x0, 0x3, 0x95, &(0x7f00000003c0)=""/149, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xf, 0x7f, 0x3ff}, 0x10, r2, r1}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600), 0x8) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:18:45 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000280)='9p_client_req\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r1, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x8, 0x1700, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f00000002c0)}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x5, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x2, &(0x7f0000000180)=@raw=[@map_idx_val={0x18, 0x2, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x3ff}], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x80, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)=[r1, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 493.187376][ T4093] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 493.245560][ T4093] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 493.288185][ T4093] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 493.383497][ T4093] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 494.636449][ T49] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 494.637823][ T49] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 494.649393][ T49] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 494.652804][ T4093] device hsr_slave_0 left promiscuous mode [ 494.653616][ T49] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 494.666633][ T4093] device hsr_slave_1 left promiscuous mode [ 494.666811][ T49] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 494.673995][ T49] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 494.687054][ T4093] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 494.687090][ T4093] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 494.696210][ T4093] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 494.696235][ T4093] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 494.703521][ T4093] device bridge_slave_1 left promiscuous mode [ 494.703648][ T4093] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.713772][ T4093] device bridge_slave_0 left promiscuous mode [ 494.713921][ T4093] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.727439][ T4093] device veth1_macvtap left promiscuous mode [ 494.727476][ T4093] device veth0_macvtap left promiscuous mode [ 494.727547][ T4093] device veth1_vlan left promiscuous mode [ 494.728242][ T4093] device veth0_vlan left promiscuous mode [ 495.045844][ T4093] team0 (unregistering): Port device team_slave_1 removed [ 495.075870][ T4093] team0 (unregistering): Port device team_slave_0 removed [ 495.097439][ T4093] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 495.122596][ T4093] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 495.257180][ T4093] bond0 (unregistering): Released all slaves [ 495.465235][ T6189] chnl_net:caif_netlink_parms(): no params data found [ 495.548247][ T6189] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.548366][ T6189] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.558839][ T3635] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 495.581187][ T6189] device bridge_slave_0 entered promiscuous mode [ 495.590061][ T6189] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.590119][ T6189] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.591122][ T6189] device bridge_slave_1 entered promiscuous mode [ 495.720178][ T6189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 495.722806][ T6189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 495.820524][ T6189] team0: Port device team_slave_0 added [ 495.822601][ T6189] team0: Port device team_slave_1 added [ 495.910522][ T6189] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 495.910537][ T6189] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 495.910564][ T6189] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 495.912456][ T6189] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 495.912468][ T6189] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 495.912494][ T6189] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 496.011767][ T6189] device hsr_slave_0 entered promiscuous mode [ 496.025439][ T6189] device hsr_slave_1 entered promiscuous mode [ 496.033446][ T6189] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 496.033470][ T6189] Cannot create hsr debugfs directory [ 496.284290][ T6189] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.284357][ T6189] bridge0: port 2(bridge_slave_1) entered forwarding state [ 496.284530][ T6189] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.284606][ T6189] bridge0: port 1(bridge_slave_0) entered forwarding state [ 496.395114][ T6189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 496.414975][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 496.415938][ T4270] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.416684][ T4270] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.418269][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 496.447843][ T6189] 8021q: adding VLAN 0 to HW filter on device team0 [ 496.462078][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 496.462570][ T4272] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.462635][ T4272] bridge0: port 1(bridge_slave_0) entered forwarding state [ 496.467431][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 496.467870][ T4272] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.467927][ T4272] bridge0: port 2(bridge_slave_1) entered forwarding state [ 496.494167][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 496.495243][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 496.495950][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 496.506317][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 496.507116][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 496.516092][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 496.516749][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 496.526628][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 496.527251][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 496.535206][ T6189] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 496.566646][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 496.566782][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 496.582722][ T6189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 496.762255][ T4940] Bluetooth: hci4: command 0x0409 tx timeout [ 497.343384][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 497.343982][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 497.380627][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 497.381311][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 497.382146][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 497.382709][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.386410][ T6189] device veth0_vlan entered promiscuous mode [ 497.393990][ T6189] device veth1_vlan entered promiscuous mode [ 497.477796][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 497.478532][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 497.479147][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 497.479743][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 497.484915][ T6189] device veth0_macvtap entered promiscuous mode [ 497.489963][ T6189] device veth1_macvtap entered promiscuous mode [ 497.514300][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 497.514944][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 497.530396][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 497.530417][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.530425][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 497.530438][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.530448][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 497.530468][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.530477][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 497.530490][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.531819][ T6189] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 497.531928][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 497.532603][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 497.535970][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 497.535989][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.535998][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 497.536010][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.536017][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 497.536031][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.536040][ T6189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 497.536053][ T6189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 497.537252][ T6189] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 497.537360][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 497.538047][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 497.688981][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 497.689001][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 497.733237][ T4939] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 497.789396][ T93] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 497.789416][ T93] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 497.792032][ T4939] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 498.839415][ T4939] Bluetooth: hci4: command 0x041b tx timeout [ 500.926082][ T4940] Bluetooth: hci4: command 0x040f tx timeout [ 501.241445][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.241501][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.248291][ T3635] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 503.014523][ T4270] Bluetooth: hci4: command 0x0419 tx timeout [ 506.598785][ T3635] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 508.438657][ T27] Bluetooth: hci3: command 0x0406 tx timeout [ 509.897782][ T3639] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 509.907972][ T3639] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 509.919292][ T3639] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 509.931193][ T3639] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 509.931974][ T3639] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 509.932423][ T3639] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 510.122275][ T6472] chnl_net:caif_netlink_parms(): no params data found [ 510.229319][ T6472] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.229447][ T6472] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.230531][ T6472] device bridge_slave_0 entered promiscuous mode [ 510.232848][ T6472] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.232979][ T6472] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.234154][ T6472] device bridge_slave_1 entered promiscuous mode [ 510.321132][ T6472] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 510.324734][ T6472] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 510.396761][ T6472] team0: Port device team_slave_0 added [ 510.413251][ T6472] team0: Port device team_slave_1 added [ 510.447911][ T6472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 510.447928][ T6472] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 510.447956][ T6472] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 510.501048][ T6472] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 510.501065][ T6472] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 510.501093][ T6472] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 510.597515][ T6472] device hsr_slave_0 entered promiscuous mode [ 510.598321][ T6472] device hsr_slave_1 entered promiscuous mode [ 510.601515][ T6472] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 510.601541][ T6472] Cannot create hsr debugfs directory [ 510.813152][ T6472] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.813222][ T6472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.813398][ T6472] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.813474][ T6472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.950166][ T6472] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.958466][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.979813][ T4270] bridge0: port 1(bridge_slave_0) entered disabled state [ 510.980782][ T4270] bridge0: port 2(bridge_slave_1) entered disabled state [ 510.983403][ T4270] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 511.009708][ T6472] 8021q: adding VLAN 0 to HW filter on device team0 [ 511.046286][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 511.046790][ T3664] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.046847][ T3664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.047288][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 511.047711][ T3664] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.047770][ T3664] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.091551][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 511.092323][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 511.096907][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 511.097691][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 511.127751][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 511.128807][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 511.134039][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 511.134629][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 511.166003][ T6472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 511.209124][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 511.209257][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 511.259651][ T6472] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 511.958646][ T4938] Bluetooth: hci2: command 0x0409 tx timeout [ 512.299357][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 512.300019][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 512.366919][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 512.367590][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 512.368615][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 512.369179][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 512.406323][ T6472] device veth0_vlan entered promiscuous mode [ 512.424553][ T6472] device veth1_vlan entered promiscuous mode [ 512.609561][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 512.610238][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 512.610834][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 512.611426][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 512.653420][ T6472] device veth0_macvtap entered promiscuous mode [ 512.661060][ T6472] device veth1_macvtap entered promiscuous mode [ 512.731309][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.731330][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.731339][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.731353][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.731363][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.731378][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.731388][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.731402][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.731411][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 512.731425][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.742064][ T6472] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 512.742212][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 512.742880][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 512.743469][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 512.744063][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 512.760461][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.760483][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.760492][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.760506][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.760517][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.760531][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.760542][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.760556][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.760565][ T6472] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 512.760580][ T6472] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 512.761968][ T6472] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 512.762082][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 512.762885][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 513.109419][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 513.109439][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 513.137172][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 513.215144][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 513.215163][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 513.217582][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 514.039325][ T27] Bluetooth: hci2: command 0x041b tx timeout [ 516.120337][ T27] Bluetooth: hci2: command 0x040f tx timeout 17:19:11 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:19:11 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:19:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x0, 0xe, 0xfffff000, &(0x7f0000000080)="08a8699cca08eec82cbab38baee7", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) 17:19:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x144}, 0x0) 17:19:11 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1ab, &(0x7f00000003c0)='bdev!)-%+wlan\x00posi\x19Mx_dxl_accesszQ\tU\x97\x12=J\xd5\x8b;YE\xec\x8c;\xf7\xcc\xa7\x8b6\n\xbe\x01\x01\xae\xb6\f4\x87\xd9j\xd8\x0e\xc2\x10\xb1\x7f\x95\x01fE\xaea\x10\x8f\xac\xa9+V\x863Hhk{2\x00\x14I\xf7\xd6\xcd)\x05\x87q6\xed~\xd0\xb2\xf8\x8d\xaa\b\xe4\"\x1c\xbf\x8f_[\x17@\xe5\xec\x10\a\xb95w\x8by}/\x8cw\xe6\x99\xfe \x84]8\x940U\xb3E;\xff\xa1!\x9a\x87\x88\x02\xbf\xab\x97B\xd9\x06\xf2\n\xf7\x1f\xd8v\x7fD\xf2\x87\xf7}V\x89}\xf0\xb7\x8d\x85\xf6\x9b\xcc\xd3Lh.\r\xd3J\"\x1f\xdeW;F.\xdf$\xee\x18\x0e5\xa1\xfcN\x88`\xbbj,q[\x90/\x9b\xf0\xccr\xc1\xa8\x85E\x85p+\xd1\xbe\x10\rgx\xb8\x93k\x8c\x1dTi\xafq\xde\x06/ \x93O.\xe5<0\xfa\b\x82\xe4c&\x99\xd6psf\xa8\xacjh9\x8bk\x8f\n$\xf2\x06#\xc8\xd2\x00\x00w\x03,\xbb\xed\xf1o\xd8\x19\xd2\x1d\xbb\xd3\x18E\x0e&\x83\xdfWL?P$\xb4a\f\x154\xdd\xacx\x91<\x97\x13\xab\xe2\xdd\n\x13\x19\xb9U\n\xb5\xb6\xffBQ\x80\xe6\xe6\xaf\xc8\x15_>\xe6\xfc\xb9R\x06\xcd/\x87\x11\xf1\xb9\xbe&,c\xfd3\xc4\xeaP\x9b\xdf5\xcc\xa4RDx\xad\xc0\x8f|\xe3u\xbe\x1e\xd5\xa6\xcc\xb8\x86\x8b0\'\xcc\x01\x9bQ/\xf9\xa7vfa\xdf!\x1axt\xd1\r\xd9&MC\xcc,2\xce\xd2kCJ\x10\x88\xc5#\x92\xa32)2\xd3\xa02q\xdb\xe4\xe3\x97\x9d\xbc\xc9\xf8G'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) 17:19:11 executing program 0: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000049b87ca38328c86925c373e2ce4b6e55a39e85fdf852daf3c4262d52968db274c25d836b1c", @ANYRES32=0x1, @ANYBLOB="000000000000000085100000060000008510000003000000180000004000000000000000616e000001d5030000000000950000000000000018000000040000000000000006000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x40, &(0x7f0000000340)=""/64, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7, 0x87, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000004c0)=r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000240)='.\x02', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.kill\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) 17:19:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000240)=""/142, 0x2f, 0x8e, 0x1}, 0x20) 17:19:12 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x2}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) close(r0) [ 518.070236][ T6590] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 518.070272][ T6590] CPU: 1 PID: 6590 Comm: syz-executor.0 Not tainted 5.18.0-syzkaller-12183-g08c79c9cd67f #0 [ 518.070301][ T6590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:19:13 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x4, 0x3f, 0x7, 0xc, 0x0, 0x0, 0x8a010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6f8, 0x2, @perf_config_ext={0x0, 0x29}, 0x80, 0x0, 0x9, 0x6, 0x4, 0x3, 0xaa5, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x6, 0x7f, 0x4, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0x8}, 0x121, 0x2f4, 0x80000001, 0x2, 0xebd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x4}, 0x80, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='8'], 0x38}, 0x8000) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90009, 0x2}, 0x397, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280), 0x0, 0x67c20000}, 0x0) [ 518.070316][ T6590] Call Trace: 17:19:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a43, 0x1700) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) [ 518.070323][ T6590] [ 518.070332][ T6590] dump_stack_lvl+0xcd/0x134 [ 518.070369][ T6590] dump_header+0x10b/0x7f9 [ 518.070402][ T6590] oom_kill_process.cold+0x10/0x15 [ 518.070436][ T6590] out_of_memory+0x358/0x14a0 [ 518.070484][ T6590] ? oom_killer_disable+0x270/0x270 [ 518.070529][ T6590] ? io_schedule_timeout+0x140/0x140 [ 518.070572][ T6590] mem_cgroup_out_of_memory+0x206/0x270 [ 518.070607][ T6590] ? mem_cgroup_margin+0x130/0x130 [ 518.070661][ T6590] memory_max_write+0x25c/0x3b0 [ 518.070698][ T6590] ? mem_cgroup_force_empty_write+0x150/0x150 [ 518.070737][ T6590] ? lock_release+0x780/0x780 [ 518.070778][ T6590] cgroup_file_write+0x1de/0x770 [ 518.070806][ T6590] ? mem_cgroup_force_empty_write+0x150/0x150 [ 518.070841][ T6590] ? kill_css+0x370/0x370 [ 518.070865][ T6590] ? __phys_addr+0xc4/0x140 [ 518.070911][ T6590] ? kill_css+0x370/0x370 [ 518.070935][ T6590] kernfs_fop_write_iter+0x3f8/0x610 [ 518.070973][ T6590] new_sync_write+0x38a/0x560 [ 518.071006][ T6590] ? new_sync_read+0x5f0/0x5f0 [ 518.071045][ T6590] ? lock_release+0x780/0x780 [ 518.071103][ T6590] vfs_write+0x7c0/0xac0 [ 518.071142][ T6590] ksys_write+0x127/0x250 [ 518.071173][ T6590] ? __ia32_sys_read+0xb0/0xb0 [ 518.071210][ T6590] ? syscall_enter_from_user_mode+0x21/0x70 [ 518.071240][ T6590] ? syscall_enter_from_user_mode+0x21/0x70 [ 518.071278][ T6590] do_syscall_64+0x35/0xb0 [ 518.071309][ T6590] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 518.071340][ T6590] RIP: 0033:0x7f22c5c89109 [ 518.071362][ T6590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 518.071388][ T6590] RSP: 002b:00007f22c6dce168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 518.071414][ T6590] RAX: ffffffffffffffda RBX: 00007f22c5d9c030 RCX: 00007f22c5c89109 [ 518.071432][ T6590] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000006 [ 518.071449][ T6590] RBP: 00007f22c5ce305d R08: 0000000000000000 R09: 0000000000000000 [ 518.071466][ T6590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 518.071482][ T6590] R13: 00007ffe5731df6f R14: 00007f22c6dce300 R15: 0000000000022000 [ 518.071531][ T6590] [ 518.075302][ T6590] memory: usage 708kB, limit 0kB, failcnt 36 [ 518.075323][ T6590] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 518.075339][ T6590] Memory cgroup stats for /syz0: [ 518.075540][ T6590] anon 143360 [ 518.075540][ T6590] file 139264 [ 518.075540][ T6590] kernel 442368 [ 518.075540][ T6590] kernel_stack 98304 [ 518.075540][ T6590] pagetables 77824 [ 518.075540][ T6590] percpu 0 [ 518.075540][ T6590] sock 0 [ 518.075540][ T6590] vmalloc 0 [ 518.075540][ T6590] shmem 135168 [ 518.075540][ T6590] zswap 0 [ 518.075540][ T6590] zswapped 0 [ 518.075540][ T6590] file_mapped 122880 [ 518.075540][ T6590] file_dirty 0 [ 518.075540][ T6590] file_writeback 0 [ 518.075540][ T6590] swapcached 0 [ 518.075540][ T6590] anon_thp 0 [ 518.075540][ T6590] file_thp 0 [ 518.075540][ T6590] shmem_thp 0 [ 518.075540][ T6590] inactive_anon 147456 [ 518.075540][ T6590] active_anon 131072 [ 518.075540][ T6590] inactive_file 0 [ 518.075540][ T6590] active_file 4096 [ 518.075540][ T6590] unevictable 0 [ 518.075540][ T6590] slab_reclaimable 81328 [ 518.075540][ T6590] slab_unreclaimable 154368 [ 518.075540][ T6590] slab 235696 [ 518.075540][ T6590] workingset_refault_anon 0 [ 518.075616][ T6590] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=5409,uid=0 [ 518.075754][ T6590] Memory cgroup out of memory: Killed process 5409 (syz-executor.0) total-vm:50536kB, anon-rss:380kB, file-rss:9072kB, shmem-rss:64kB, UID:0 pgtables:72kB oom_score_adj:0 17:19:17 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0xc, &(0x7f0000000300)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc82a}, @ldst={0x1, 0x0, 0x0, 0xd, 0xb, 0x18}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}]}, 0x0, 0x3, 0x95, &(0x7f00000003c0)=""/149, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xf, 0x7f, 0x3ff}, 0x10, r2, r1}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600), 0x8) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:19:17 executing program 0: socketpair$unix(0xa, 0x2, 0x0, &(0x7f0000002dc0)) r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x9, 0x6, 0xff, 0x56, 0x0, 0x9, 0x1802, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x200}, 0x2, 0x7, 0x8, 0x3, 0x2, 0x7, 0x2, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x74249000, &(0x7f0000000180)="6163904ce38b64c0b95dcbf63fe302d5f0c45a2dac5cd4eb9485420b69444191b9be609a67de66d1ca70a68955", 0x2d, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x87, &(0x7f0000000280)='\x00:\x03\xcdD6\xbe\x94\xc7\x94\v\x97\xcd3DiVP\xefN\a\xfel\xaf}C?\xfe\xc4m\v(\x01.\xce/\x95\xd6&\xe3m?\v\xa2\x86\"\"\xa1\x01\xc4\x8bI\x8c\xc6\x8d\xe5Zu\x95\x91\b\x94&\xd6\x0f\xd4Ik\xf5\xef\x16\xbdt\x16\xcc\xb8+/\x04\xf7\x9b\x04;\xbc\x0e <(\xc8(\xe4\xcd\x9bq>\xd8`\x1eG\x1f\xcd\xe8\xba\xe1v\xbd\x0f\x94n\xa8ku\x8f\xecc#3\xb2\xa6!\xa6\x12\xafa\xbc\"\xcb\xe5\xf5\xffk%\xaf\xddc'}, 0x30) getpid() socketpair$unix(0x10, 0x0, 0x2, &(0x7f0000002dc0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0xf801, 0x3, 0x1, 0x20}, {0x1, 0x5, 0x2, 0xa19}]}) [ 518.199124][ T27] Bluetooth: hci2: command 0x0419 tx timeout [ 519.364640][ T28] audit: type=1804 audit(1655486354.085:2): pid=6603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3527455620/syzkaller.wKPIif/70/memory.events" dev="sda1" ino=1185 res=1 errno=0 [ 519.494911][ T28] audit: type=1800 audit(1655486354.085:3): pid=6603 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1185 res=0 errno=0 [ 526.911315][ T3639] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 526.913453][ T3639] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 526.914025][ T3639] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 526.914778][ T3639] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 526.915267][ T3639] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 526.915524][ T3639] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 527.787612][ T6640] chnl_net:caif_netlink_parms(): no params data found [ 528.321761][ T6640] bridge0: port 1(bridge_slave_0) entered blocking state [ 528.339039][ T6640] bridge0: port 1(bridge_slave_0) entered disabled state [ 528.356041][ T6640] device bridge_slave_0 entered promiscuous mode [ 528.485293][ T6640] bridge0: port 2(bridge_slave_1) entered blocking state [ 528.485425][ T6640] bridge0: port 2(bridge_slave_1) entered disabled state [ 528.486669][ T6640] device bridge_slave_1 entered promiscuous mode [ 528.826458][ T6640] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 528.913478][ T6640] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 528.922491][ T4938] Bluetooth: hci3: command 0x0409 tx timeout [ 529.328205][ T6640] team0: Port device team_slave_0 added [ 529.338278][ T6640] team0: Port device team_slave_1 added [ 529.656928][ T6640] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 529.656943][ T6640] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 529.656970][ T6640] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 529.659609][ T6640] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 529.659623][ T6640] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 529.659650][ T6640] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 530.075005][ T6640] device hsr_slave_0 entered promiscuous mode [ 530.076030][ T6640] device hsr_slave_1 entered promiscuous mode [ 530.084278][ T6640] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 530.084304][ T6640] Cannot create hsr debugfs directory [ 530.204177][ T93] device hsr_slave_0 left promiscuous mode [ 530.204911][ T93] device hsr_slave_1 left promiscuous mode [ 530.205683][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 530.205717][ T93] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 530.207954][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 530.207978][ T93] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 530.211348][ T93] device bridge_slave_1 left promiscuous mode [ 530.211484][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 530.221790][ T93] device bridge_slave_0 left promiscuous mode [ 530.221929][ T93] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.319590][ T93] device veth1_macvtap left promiscuous mode [ 530.319656][ T93] device veth0_macvtap left promiscuous mode [ 530.319796][ T93] device veth1_vlan left promiscuous mode [ 530.319895][ T93] device veth0_vlan left promiscuous mode [ 531.000072][ T4940] Bluetooth: hci3: command 0x041b tx timeout [ 532.381154][ T93] team0 (unregistering): Port device team_slave_1 removed [ 532.518866][ T93] team0 (unregistering): Port device team_slave_0 removed [ 532.589491][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 532.770619][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 533.079025][ T4940] Bluetooth: hci3: command 0x040f tx timeout [ 533.095124][ T93] bond0 (unregistering): Released all slaves [ 533.909643][ T6640] 8021q: adding VLAN 0 to HW filter on device bond0 [ 534.066128][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 534.066769][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 534.084976][ T6640] 8021q: adding VLAN 0 to HW filter on device team0 [ 534.169728][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 534.170373][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 534.170792][ T4938] bridge0: port 1(bridge_slave_0) entered blocking state [ 534.170860][ T4938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 534.171445][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 534.189601][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 534.190234][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 534.190640][ T4938] bridge0: port 2(bridge_slave_1) entered blocking state [ 534.190703][ T4938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 534.222386][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 534.280589][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 534.360225][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 534.361533][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 534.362281][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 534.521651][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 534.522492][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 534.523203][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 534.523749][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 534.527348][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 534.527949][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 534.554472][ T6640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 534.720408][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 534.720547][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 534.779540][ T6640] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 535.159443][ T4938] Bluetooth: hci3: command 0x0419 tx timeout 17:19:30 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:19:30 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb7, 0x5, 0x0, 0x0, 0x0, 0x71, 0x10, 0xc}, [@ldst={0x4, 0x2, 0x2, 0x0, 0x0, 0x0, 0x80ffffff}]}, &(0x7f00000002c0)='GPL\x00', 0x5, 0xfd90, &(0x7f0000000300)=""/188, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f3, 0x10, &(0x7f0000000080), 0xfffffffffffffc79}, 0x2a) 17:19:30 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a43, 0x1700) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:19:30 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea04850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x0, 0xb62, 0x3}, 0x10, 0x4a68, 0xffffffffffffffff, 0x0, &(0x7f0000000780)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000640)={0x0, r2}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x48a00000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:19:30 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2e}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518008100bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 535.887259][ T28] audit: type=1804 audit(1655486370.605:4): pid=6663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3527455620/syzkaller.wKPIif/71/memory.events" dev="sda1" ino=1172 res=1 errno=0 [ 535.898448][ T28] audit: type=1800 audit(1655486370.615:5): pid=6663 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1172 res=0 errno=0 17:19:31 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a43, 0x1700) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:19:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2e}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518008100bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) 17:19:31 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2e}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518008100bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 537.474529][ T28] audit: type=1804 audit(1655486372.155:6): pid=6678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3527455620/syzkaller.wKPIif/72/memory.events" dev="sda1" ino=1179 res=1 errno=0 [ 537.598647][ T28] audit: type=1800 audit(1655486372.195:7): pid=6678 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1179 res=0 errno=0 17:19:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305839, &(0x7f0000000040)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a43, 0x1700) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 17:19:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x2e}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x2d1, 0xfffffffffffffcf4, &(0x7f0000000100)="b9ff0300008d69e414d518008100bb3a8d511f4bb387a5b813fe0f09001affff45d71e4d7d7de198b94e1e21a6b9ff183f", 0x0, 0x100, 0x6000000000000000}, 0x28) [ 538.421358][ T28] audit: type=1804 audit(1655486373.135:8): pid=6686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir3527455620/syzkaller.wKPIif/73/memory.events" dev="sda1" ino=1178 res=1 errno=0 [ 538.424238][ T28] audit: type=1800 audit(1655486373.145:9): pid=6686 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.5" name="memory.events" dev="sda1" ino=1178 res=0 errno=0 [ 539.298628][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 539.299266][ T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 541.036797][ T6640] device veth0_vlan entered promiscuous mode [ 541.046149][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 541.047001][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 541.048052][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 541.049600][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 541.394272][ T6640] device veth1_vlan entered promiscuous mode [ 541.898309][ T6640] device veth0_macvtap entered promiscuous mode [ 541.917933][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 541.918804][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 541.919475][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 542.397184][ T6640] device veth1_macvtap entered promiscuous mode [ 542.746291][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 542.746313][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.746323][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 542.746337][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.746348][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 542.746362][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.746372][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 542.746386][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.746396][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 542.746410][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.747856][ T6640] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 542.793379][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 542.794080][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 542.990860][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 542.990882][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.990891][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 542.990906][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.990916][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 542.990930][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.990940][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 542.990954][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.990965][ T6640] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 542.990979][ T6640] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 542.992284][ T6640] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 543.078895][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 543.080209][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 543.685532][ T8] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 543.685552][ T8] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 543.688108][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 543.831925][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 543.831947][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 543.834522][ T6503] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 562.795499][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.795561][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 17:20:19 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600)={0x0, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0xc, &(0x7f0000000300)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffd}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc82a}, @ldst={0x1, 0x0, 0x0, 0xd, 0xb, 0x18}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}]}, 0x0, 0x3, 0x95, &(0x7f00000003c0)=""/149, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xf, 0x7f, 0x3ff}, 0x10, r2, r1}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000600), 0x8) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000200000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x9a, &(0x7f0000000000)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x50000000, 0x0, 0x2a452cb9d000, 0x0, 0x0, 0x0) 17:20:19 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x6, 0x1000}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000feffffff000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(r0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000005c0)="020836f041d5263dbb459428a55bbc40cd4ab024d77e72ce589a70acdb12ada4bae30d8c333a29b6cb5006", 0x2b}, {&(0x7f0000000840)="7b281947e6a611495e6ebdcbd7fc0a1f37a89f27a809826dabcb77cbc2e2a2e26e8714184ff73034950b6729da03a58827c8576ea95f64941b9546f9a44f34789d9143da8dd5073b02945d49efcc2c05d8e846b209fe8258f0bc8c98c4af0f2c08f7977b701cdbb4c4aad441e5c32b0102f517a365471558fb998167ef422b971aecf916e74ddcdb8321969c17a8bf6a1535bb450d69cc10a9c502144c244f1fb33792070c59269ab8634a37c8c2", 0xae}, {&(0x7f0000000900)="7fd3a5e53e69c1b27ad2b2f480a6040bf81d0bca9171305304866da4dcd0bf83023ff9e83d7da914ab60dfaea9148e78d6409dbb5bd876e8231cee4c27f4c0f8e944b85fe1169eb644ad174b100076435c45c567c71279b679203d0ffda0a8abc1299d894c06", 0x66}, {&(0x7f0000000980)="822b2d87ef1933708e9f8eadd91dc2c955a13cb49eaa80c47e5a73cb80273c8d1589589cd35c5d6af2c57310bf6c6abecfef69cfcb773486fa64525658ff39fb66ae0daa342b49471fedd2bd7a6893be658bb0d8230548d8170715945ae5732a0c1bb8062784fbbd371d2e1c0c908ff298ff7dc1cd220775108d740a6e5e8fc40ed7f6ef2c1b3fae089ac91989576f3d1d633b9c318b880d2ec826752cbcb7de5d36a88b6c286c84f243b68bddac", 0xae}, {&(0x7f0000000a40)="d80e39ddee95437523e50bab64442b4cc276343e2b0d7bad5693ea49afc88625e05640d2406f7ee5fee2331f35aeaff41432f925423f3b76240ff476a782e639bb8e640733e09d100da777f819b4761f1902e4465c78b72ab07dc09ca47068232949fa5730443678c490cf82ff5b7d0feac9e1105bea4d0e", 0x78}, {&(0x7f0000000ac0)="4af3f69428853533af8000174dff52a64ae822360fd5bac47d47a04dcee00b64a0b66ef6c73dab18c96cd4e86fc8f6542a26340a89276e52ba928c5cf167fe46c9eff0db53e71e5e8f4e", 0x4a}], 0x6}, 0x800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[], 0x380}, 0x40001) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x20000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)="fd13099630131d4068b71950aa5311eca284499c0e18b2a938f6809a225b8c4b49c385eb90b892e4e287904d0212d64d6f5a3d73314250bb0be99e05a700d56ef8bfe876b57d7dc000b742f48eb1debe28a9b7278f528091cb340cd79b766edd43001999f7a0654ed7b66d4101b93243360d4cacd5d29e406d08e411eb3cd42785f64c3e3c48153fa0d6cae809dfb450fef11061b4c2028eb40a417919f12c0d8d445ba7bde7344654ce0ae8b89587189854e82b7be93017d0ca8c636af17ba11ba8e6373413890c33c10669abf84cc1e030b82ca5b9ea0d7abf9c2537b399ddaa5ec160f09376", 0xe7}, {&(0x7f0000000440)="bc5d838294280be712a17c3ef09f4bf5cb73d510021b10cfaaa6948a7a52e94f8cef9a71bfa97756d25e6d671a5aeb62d69762af326d0336879a493841fb99ad59ab817988cf8a5b3ae35f11b3801a35d486773abce7d7b712ed47daa2cb4c99d153feb779766bec3d7daf5eef9c66b30385be679e14f38781382101b4cb038463ceb5104a94ea31da497d7e78e8899bd7fff3fd72892f8e1220295fc51417a3f43d636a53cac11de6c145ce0aaf65fb", 0xb0}, {&(0x7f0000000640)="06a79b2e7dbe1fec078333a2263ad4726275fca43f5040b3eff9812ff71dca0936f1f2ed1554448ca4fd7399a2b3b700eb894045697b50d8a66d0d963028973bf4cd9edfb33d95434f33db10952164479ae5d8b14776407cf731150b3fadf508112ab75f171aab5743ad5d7f6f48cd1ee4e332fb4d099c4130250c51d2584caabffe226bb18f341fdfb8f2f7c44bffba8585e750cf4e573765a05b0e00b58722016da970f7b33fba13c3c40a2bac2e45f1a65e3bb2244b0806e1021051fc1d41fc9f768975826d91cc9e57537f03aed9d05341983c238f51d4abecc2831e862a415c93", 0xe3}, {&(0x7f0000000040)="6a010f635b7019e9da11ca4ae1e46d024362791ad0feb5a99c3e38d8", 0x1c}], 0x4}, 0x8080) 17:20:19 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x8c230100, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000340)=r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 17:20:19 executing program 0: socketpair$unix(0xa, 0x2, 0x0, &(0x7f0000002dc0)) r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x9, 0x6, 0xff, 0x56, 0x0, 0x9, 0x1802, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x200}, 0x2, 0x7, 0x8, 0x3, 0x2, 0x7, 0x2, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x74249000, &(0x7f0000000180)="6163904ce38b64c0b95dcbf63fe302d5f0c45a2dac5cd4eb9485420b69444191b9be609a67de66d1ca70a68955", 0x2d, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x87, &(0x7f0000000280)='\x00:\x03\xcdD6\xbe\x94\xc7\x94\v\x97\xcd3DiVP\xefN\a\xfel\xaf}C?\xfe\xc4m\v(\x01.\xce/\x95\xd6&\xe3m?\v\xa2\x86\"\"\xa1\x01\xc4\x8bI\x8c\xc6\x8d\xe5Zu\x95\x91\b\x94&\xd6\x0f\xd4Ik\xf5\xef\x16\xbdt\x16\xcc\xb8+/\x04\xf7\x9b\x04;\xbc\x0e <(\xc8(\xe4\xcd\x9bq>\xd8`\x1eG\x1f\xcd\xe8\xba\xe1v\xbd\x0f\x94n\xa8ku\x8f\xecc#3\xb2\xa6!\xa6\x12\xafa\xbc\"\xcb\xe5\xf5\xffk%\xaf\xddc'}, 0x30) getpid() socketpair$unix(0x10, 0x0, 0x2, &(0x7f0000002dc0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0xf801, 0x3, 0x1, 0x20}, {0x1, 0x5, 0x2, 0xa19}]}) 17:20:19 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x58000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) [ 584.926831][ T6713] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 585.559822][ T6713] 8021q: adding VLAN 0 to HW filter on device team0 [ 585.568182][ T6713] bond0: (slave team0): Enslaving as an active interface with an up link [ 585.588224][ T6713] syz-executor.5 (6713) used greatest stack depth: 22104 bytes left [ 585.629425][ T6719] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 585.630998][ T6719] bond0: (slave team0): Releasing backup interface [ 585.644662][ T6719] bridge0: port 3(team0) entered blocking state [ 585.644743][ T6719] bridge0: port 3(team0) entered disabled state [ 585.655204][ T6719] device team0 entered promiscuous mode [ 585.655222][ T6719] device team_slave_0 entered promiscuous mode [ 585.655422][ T6719] device team_slave_1 entered promiscuous mode [ 586.719292][ T42] device hsr_slave_0 left promiscuous mode [ 586.721168][ T42] device hsr_slave_1 left promiscuous mode [ 586.722016][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 586.722053][ T42] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 586.724366][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 586.724391][ T42] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 586.733238][ T42] device bridge_slave_1 left promiscuous mode [ 586.733389][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 586.752911][ T42] device bridge_slave_0 left promiscuous mode [ 586.753064][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 586.819519][ T42] device veth1_macvtap left promiscuous mode [ 586.819583][ T42] device veth0_macvtap left promiscuous mode [ 586.819719][ T42] device veth1_vlan left promiscuous mode [ 586.819813][ T42] device veth0_vlan left promiscuous mode [ 588.030062][ T42] team0 (unregistering): Port device team_slave_1 removed [ 588.093735][ T42] team0 (unregistering): Port device team_slave_0 removed [ 588.160113][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 588.187307][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 588.387142][ T42] bond0 (unregistering): Released all slaves [ 591.327477][ T3635] Bluetooth: hci4: Opcode 0x c03 failed: -110 17:20:27 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x8c230100, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000340)=r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 17:20:27 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x6, 0x1000}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000feffffff000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(r0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000005c0)="020836f041d5263dbb459428a55bbc40cd4ab024d77e72ce589a70acdb12ada4bae30d8c333a29b6cb5006", 0x2b}, {&(0x7f0000000840)="7b281947e6a611495e6ebdcbd7fc0a1f37a89f27a809826dabcb77cbc2e2a2e26e8714184ff73034950b6729da03a58827c8576ea95f64941b9546f9a44f34789d9143da8dd5073b02945d49efcc2c05d8e846b209fe8258f0bc8c98c4af0f2c08f7977b701cdbb4c4aad441e5c32b0102f517a365471558fb998167ef422b971aecf916e74ddcdb8321969c17a8bf6a1535bb450d69cc10a9c502144c244f1fb33792070c59269ab8634a37c8c2", 0xae}, {&(0x7f0000000900)="7fd3a5e53e69c1b27ad2b2f480a6040bf81d0bca9171305304866da4dcd0bf83023ff9e83d7da914ab60dfaea9148e78d6409dbb5bd876e8231cee4c27f4c0f8e944b85fe1169eb644ad174b100076435c45c567c71279b679203d0ffda0a8abc1299d894c06", 0x66}, {&(0x7f0000000980)="822b2d87ef1933708e9f8eadd91dc2c955a13cb49eaa80c47e5a73cb80273c8d1589589cd35c5d6af2c57310bf6c6abecfef69cfcb773486fa64525658ff39fb66ae0daa342b49471fedd2bd7a6893be658bb0d8230548d8170715945ae5732a0c1bb8062784fbbd371d2e1c0c908ff298ff7dc1cd220775108d740a6e5e8fc40ed7f6ef2c1b3fae089ac91989576f3d1d633b9c318b880d2ec826752cbcb7de5d36a88b6c286c84f243b68bddac", 0xae}, {&(0x7f0000000a40)="d80e39ddee95437523e50bab64442b4cc276343e2b0d7bad5693ea49afc88625e05640d2406f7ee5fee2331f35aeaff41432f925423f3b76240ff476a782e639bb8e640733e09d100da777f819b4761f1902e4465c78b72ab07dc09ca47068232949fa5730443678c490cf82ff5b7d0feac9e1105bea4d0e", 0x78}, {&(0x7f0000000ac0)="4af3f69428853533af8000174dff52a64ae822360fd5bac47d47a04dcee00b64a0b66ef6c73dab18c96cd4e86fc8f6542a26340a89276e52ba928c5cf167fe46c9eff0db53e71e5e8f4e", 0x4a}], 0x6}, 0x800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[], 0x380}, 0x40001) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x20000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)="fd13099630131d4068b71950aa5311eca284499c0e18b2a938f6809a225b8c4b49c385eb90b892e4e287904d0212d64d6f5a3d73314250bb0be99e05a700d56ef8bfe876b57d7dc000b742f48eb1debe28a9b7278f528091cb340cd79b766edd43001999f7a0654ed7b66d4101b93243360d4cacd5d29e406d08e411eb3cd42785f64c3e3c48153fa0d6cae809dfb450fef11061b4c2028eb40a417919f12c0d8d445ba7bde7344654ce0ae8b89587189854e82b7be93017d0ca8c636af17ba11ba8e6373413890c33c10669abf84cc1e030b82ca5b9ea0d7abf9c2537b399ddaa5ec160f09376", 0xe7}, {&(0x7f0000000440)="bc5d838294280be712a17c3ef09f4bf5cb73d510021b10cfaaa6948a7a52e94f8cef9a71bfa97756d25e6d671a5aeb62d69762af326d0336879a493841fb99ad59ab817988cf8a5b3ae35f11b3801a35d486773abce7d7b712ed47daa2cb4c99d153feb779766bec3d7daf5eef9c66b30385be679e14f38781382101b4cb038463ceb5104a94ea31da497d7e78e8899bd7fff3fd72892f8e1220295fc51417a3f43d636a53cac11de6c145ce0aaf65fb", 0xb0}, {&(0x7f0000000640)="06a79b2e7dbe1fec078333a2263ad4726275fca43f5040b3eff9812ff71dca0936f1f2ed1554448ca4fd7399a2b3b700eb894045697b50d8a66d0d963028973bf4cd9edfb33d95434f33db10952164479ae5d8b14776407cf731150b3fadf508112ab75f171aab5743ad5d7f6f48cd1ee4e332fb4d099c4130250c51d2584caabffe226bb18f341fdfb8f2f7c44bffba8585e750cf4e573765a05b0e00b58722016da970f7b33fba13c3c40a2bac2e45f1a65e3bb2244b0806e1021051fc1d41fc9f768975826d91cc9e57537f03aed9d05341983c238f51d4abecc2831e862a415c93", 0xe3}, {&(0x7f0000000040)="6a010f635b7019e9da11ca4ae1e46d024362791ad0feb5a99c3e38d8", 0x1c}], 0x4}, 0x8080) 17:20:27 executing program 0: socketpair$unix(0xa, 0x2, 0x0, &(0x7f0000002dc0)) r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x9, 0x6, 0xff, 0x56, 0x0, 0x9, 0x1802, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x200}, 0x2, 0x7, 0x8, 0x3, 0x2, 0x7, 0x2, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x74249000, &(0x7f0000000180)="6163904ce38b64c0b95dcbf63fe302d5f0c45a2dac5cd4eb9485420b69444191b9be609a67de66d1ca70a68955", 0x2d, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x87, &(0x7f0000000280)='\x00:\x03\xcdD6\xbe\x94\xc7\x94\v\x97\xcd3DiVP\xefN\a\xfel\xaf}C?\xfe\xc4m\v(\x01.\xce/\x95\xd6&\xe3m?\v\xa2\x86\"\"\xa1\x01\xc4\x8bI\x8c\xc6\x8d\xe5Zu\x95\x91\b\x94&\xd6\x0f\xd4Ik\xf5\xef\x16\xbdt\x16\xcc\xb8+/\x04\xf7\x9b\x04;\xbc\x0e <(\xc8(\xe4\xcd\x9bq>\xd8`\x1eG\x1f\xcd\xe8\xba\xe1v\xbd\x0f\x94n\xa8ku\x8f\xecc#3\xb2\xa6!\xa6\x12\xafa\xbc\"\xcb\xe5\xf5\xffk%\xaf\xddc'}, 0x30) getpid() socketpair$unix(0x10, 0x0, 0x2, &(0x7f0000002dc0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0xf801, 0x3, 0x1, 0x20}, {0x1, 0x5, 0x2, 0xa19}]}) 17:20:27 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x1, 0x1, 0x3f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x2, 0x1}, 0x48) [ 592.818802][ T6732] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 592.821721][ T6732] device team0 left promiscuous mode [ 592.821737][ T6732] device team_slave_0 left promiscuous mode 17:20:27 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000300)={0xffffffffffffffff, 0x12, 0x0, 0x0, 0x0}, 0x20) 17:20:27 executing program 4: syz_clone(0x4100000, 0x0, 0x0, &(0x7f0000001040), 0x0, 0x0) [ 592.825962][ T6732] device team_slave_1 left promiscuous mode [ 592.848130][ T6732] bridge0: port 3(team0) entered disabled state 17:20:27 executing program 4: syz_clone(0x58000000, &(0x7f00000001c0)="07577ae85283a8d21d031731683b05ae275b030d424a1c58", 0x18, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="fded1b10f25be7dc2109b6a5b63b77") [ 593.152325][ T6732] 8021q: adding VLAN 0 to HW filter on device team0 [ 593.249651][ T6732] bond0: (slave team0): Enslaving as an active interface with an up link [ 593.278209][ T6737] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 593.292602][ T6737] bond0: (slave team0): Releasing backup interface [ 593.323180][ T6737] bridge0: port 3(team0) entered blocking state [ 593.329229][ T6737] bridge0: port 3(team0) entered disabled state [ 593.330356][ T6737] device team0 entered promiscuous mode [ 593.330370][ T6737] device team_slave_0 entered promiscuous mode [ 593.331482][ T6737] device team_slave_1 entered promiscuous mode [ 594.046744][ T42] device hsr_slave_0 left promiscuous mode [ 594.047098][ T42] device hsr_slave_1 left promiscuous mode [ 594.047439][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 594.047467][ T42] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 594.061147][ T42] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 594.061171][ T42] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 594.063293][ T42] device bridge_slave_1 left promiscuous mode [ 594.063423][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 594.065599][ T42] device bridge_slave_0 left promiscuous mode [ 594.065740][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 594.072916][ T42] device veth1_macvtap left promiscuous mode [ 594.072980][ T42] device veth0_macvtap left promiscuous mode [ 594.073115][ T42] device veth1_vlan left promiscuous mode [ 594.073213][ T42] device veth0_vlan left promiscuous mode [ 594.284252][ T42] team0 (unregistering): Port device team_slave_1 removed [ 594.298020][ T42] team0 (unregistering): Port device team_slave_0 removed [ 594.312182][ T42] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 594.316643][ T42] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 594.387438][ T42] bond0 (unregistering): Released all slaves [ 594.930605][ T3635] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 594.932085][ T3635] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 594.934354][ T3635] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 594.935453][ T3635] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 594.935941][ T3635] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 594.936418][ T3635] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 595.085025][ T6748] chnl_net:caif_netlink_parms(): no params data found [ 595.166940][ T6748] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.167066][ T6748] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.168158][ T6748] device bridge_slave_0 entered promiscuous mode [ 595.194286][ T6748] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.194416][ T6748] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.195556][ T6748] device bridge_slave_1 entered promiscuous mode [ 595.248343][ T6748] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 595.251481][ T6748] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 595.298363][ T6748] team0: Port device team_slave_0 added [ 595.300568][ T6748] team0: Port device team_slave_1 added [ 595.339986][ T6748] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 595.340002][ T6748] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 595.340029][ T6748] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 595.341948][ T6748] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 595.341961][ T6748] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 595.341989][ T6748] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 595.444482][ T6748] device hsr_slave_0 entered promiscuous mode [ 595.445226][ T6748] device hsr_slave_1 entered promiscuous mode [ 595.603655][ T6748] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.603725][ T6748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.603891][ T6748] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.603981][ T6748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.707980][ T6748] 8021q: adding VLAN 0 to HW filter on device bond0 [ 595.724294][ T4940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.725284][ T4940] bridge0: port 1(bridge_slave_0) entered disabled state [ 595.726102][ T4940] bridge0: port 2(bridge_slave_1) entered disabled state [ 595.759578][ T6748] 8021q: adding VLAN 0 to HW filter on device team0 [ 595.771587][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.772036][ T4938] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.772093][ T4938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.784166][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 595.784737][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 595.785128][ T4938] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.785181][ T4938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.785588][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 595.803611][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 595.820445][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 595.821526][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 595.822282][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 595.848915][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 595.849722][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 595.853964][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 595.854560][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.859572][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 595.860184][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.864418][ T6748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 595.890435][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 595.890574][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 595.908140][ T6748] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 596.362100][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 596.362517][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 596.365664][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 596.366072][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.366624][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.366991][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.373985][ T6748] device veth0_vlan entered promiscuous mode [ 596.391935][ T6748] device veth1_vlan entered promiscuous mode [ 596.440126][ T6748] device veth0_macvtap entered promiscuous mode [ 596.443951][ T6748] device veth1_macvtap entered promiscuous mode [ 596.449339][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 596.449894][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 596.450437][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 596.450915][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 596.451435][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 596.452992][ T3664] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 596.467699][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 596.467719][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.467728][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 596.467741][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.467751][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 596.467765][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.467774][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 596.467788][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.470994][ T6748] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 596.471174][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 596.471774][ T4272] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 596.474933][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 596.474952][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.474961][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 596.474975][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.474986][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 596.475001][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.475010][ T6748] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 596.475024][ T6748] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 596.476121][ T6748] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 596.476221][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 596.476782][ T3666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 596.559152][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 596.559171][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 596.562690][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 596.576739][ T4093] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 596.576758][ T4093] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 596.593997][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 596.999449][ T4938] Bluetooth: hci0: command 0x0409 tx timeout [ 597.962700][ T3639] Bluetooth: hci4: Opcode 0x c03 failed: -110 17:20:33 executing program 0: socketpair$unix(0xa, 0x2, 0x0, &(0x7f0000002dc0)) r0 = getpid() r1 = perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x80, 0x9, 0x6, 0xff, 0x56, 0x0, 0x9, 0x1802, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x200}, 0x2, 0x7, 0x8, 0x3, 0x2, 0x7, 0x2, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) syz_clone(0x74249000, &(0x7f0000000180)="6163904ce38b64c0b95dcbf63fe302d5f0c45a2dac5cd4eb9485420b69444191b9be609a67de66d1ca70a68955", 0x2d, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0x87, &(0x7f0000000280)='\x00:\x03\xcdD6\xbe\x94\xc7\x94\v\x97\xcd3DiVP\xefN\a\xfel\xaf}C?\xfe\xc4m\v(\x01.\xce/\x95\xd6&\xe3m?\v\xa2\x86\"\"\xa1\x01\xc4\x8bI\x8c\xc6\x8d\xe5Zu\x95\x91\b\x94&\xd6\x0f\xd4Ik\xf5\xef\x16\xbdt\x16\xcc\xb8+/\x04\xf7\x9b\x04;\xbc\x0e <(\xc8(\xe4\xcd\x9bq>\xd8`\x1eG\x1f\xcd\xe8\xba\xe1v\xbd\x0f\x94n\xa8ku\x8f\xecc#3\xb2\xa6!\xa6\x12\xafa\xbc\"\xcb\xe5\xf5\xffk%\xaf\xddc'}, 0x30) getpid() socketpair$unix(0x10, 0x0, 0x2, &(0x7f0000002dc0)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0xf801, 0x3, 0x1, 0x20}, {0x1, 0x5, 0x2, 0xa19}]}) 17:20:33 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x6, 0x1000}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000feffffff000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(r0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000005c0)="020836f041d5263dbb459428a55bbc40cd4ab024d77e72ce589a70acdb12ada4bae30d8c333a29b6cb5006", 0x2b}, {&(0x7f0000000840)="7b281947e6a611495e6ebdcbd7fc0a1f37a89f27a809826dabcb77cbc2e2a2e26e8714184ff73034950b6729da03a58827c8576ea95f64941b9546f9a44f34789d9143da8dd5073b02945d49efcc2c05d8e846b209fe8258f0bc8c98c4af0f2c08f7977b701cdbb4c4aad441e5c32b0102f517a365471558fb998167ef422b971aecf916e74ddcdb8321969c17a8bf6a1535bb450d69cc10a9c502144c244f1fb33792070c59269ab8634a37c8c2", 0xae}, {&(0x7f0000000900)="7fd3a5e53e69c1b27ad2b2f480a6040bf81d0bca9171305304866da4dcd0bf83023ff9e83d7da914ab60dfaea9148e78d6409dbb5bd876e8231cee4c27f4c0f8e944b85fe1169eb644ad174b100076435c45c567c71279b679203d0ffda0a8abc1299d894c06", 0x66}, {&(0x7f0000000980)="822b2d87ef1933708e9f8eadd91dc2c955a13cb49eaa80c47e5a73cb80273c8d1589589cd35c5d6af2c57310bf6c6abecfef69cfcb773486fa64525658ff39fb66ae0daa342b49471fedd2bd7a6893be658bb0d8230548d8170715945ae5732a0c1bb8062784fbbd371d2e1c0c908ff298ff7dc1cd220775108d740a6e5e8fc40ed7f6ef2c1b3fae089ac91989576f3d1d633b9c318b880d2ec826752cbcb7de5d36a88b6c286c84f243b68bddac", 0xae}, {&(0x7f0000000a40)="d80e39ddee95437523e50bab64442b4cc276343e2b0d7bad5693ea49afc88625e05640d2406f7ee5fee2331f35aeaff41432f925423f3b76240ff476a782e639bb8e640733e09d100da777f819b4761f1902e4465c78b72ab07dc09ca47068232949fa5730443678c490cf82ff5b7d0feac9e1105bea4d0e", 0x78}, {&(0x7f0000000ac0)="4af3f69428853533af8000174dff52a64ae822360fd5bac47d47a04dcee00b64a0b66ef6c73dab18c96cd4e86fc8f6542a26340a89276e52ba928c5cf167fe46c9eff0db53e71e5e8f4e", 0x4a}], 0x6}, 0x800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[], 0x380}, 0x40001) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x20000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)="fd13099630131d4068b71950aa5311eca284499c0e18b2a938f6809a225b8c4b49c385eb90b892e4e287904d0212d64d6f5a3d73314250bb0be99e05a700d56ef8bfe876b57d7dc000b742f48eb1debe28a9b7278f528091cb340cd79b766edd43001999f7a0654ed7b66d4101b93243360d4cacd5d29e406d08e411eb3cd42785f64c3e3c48153fa0d6cae809dfb450fef11061b4c2028eb40a417919f12c0d8d445ba7bde7344654ce0ae8b89587189854e82b7be93017d0ca8c636af17ba11ba8e6373413890c33c10669abf84cc1e030b82ca5b9ea0d7abf9c2537b399ddaa5ec160f09376", 0xe7}, {&(0x7f0000000440)="bc5d838294280be712a17c3ef09f4bf5cb73d510021b10cfaaa6948a7a52e94f8cef9a71bfa97756d25e6d671a5aeb62d69762af326d0336879a493841fb99ad59ab817988cf8a5b3ae35f11b3801a35d486773abce7d7b712ed47daa2cb4c99d153feb779766bec3d7daf5eef9c66b30385be679e14f38781382101b4cb038463ceb5104a94ea31da497d7e78e8899bd7fff3fd72892f8e1220295fc51417a3f43d636a53cac11de6c145ce0aaf65fb", 0xb0}, {&(0x7f0000000640)="06a79b2e7dbe1fec078333a2263ad4726275fca43f5040b3eff9812ff71dca0936f1f2ed1554448ca4fd7399a2b3b700eb894045697b50d8a66d0d963028973bf4cd9edfb33d95434f33db10952164479ae5d8b14776407cf731150b3fadf508112ab75f171aab5743ad5d7f6f48cd1ee4e332fb4d099c4130250c51d2584caabffe226bb18f341fdfb8f2f7c44bffba8585e750cf4e573765a05b0e00b58722016da970f7b33fba13c3c40a2bac2e45f1a65e3bb2244b0806e1021051fc1d41fc9f768975826d91cc9e57537f03aed9d05341983c238f51d4abecc2831e862a415c93", 0xe3}, {&(0x7f0000000040)="6a010f635b7019e9da11ca4ae1e46d024362791ad0feb5a99c3e38d8", 0x1c}], 0x4}, 0x8080) 17:20:33 executing program 4: syz_clone(0x58000000, &(0x7f00000001c0)="07577ae85283a8d21d031731683b05ae275b030d424a1c58", 0x18, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="fded1b10f25be7dc2109b6a5b63b77") 17:20:33 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x8c230100, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000340)=r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) 17:20:33 executing program 3: syz_clone(0x64804200, 0x0, 0x0, 0x0, 0x0, 0x0) [ 598.643191][ T6780] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 598.645496][ T6780] device team0 left promiscuous mode [ 598.645556][ T6780] device team_slave_0 left promiscuous mode [ 598.647700][ T6780] device team_slave_1 left promiscuous mode [ 598.682333][ T6780] bridge0: port 3(team0) entered disabled state 17:20:33 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x19, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x60) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg(r0, &(0x7f0000000400)={&(0x7f0000000140)=@in6={0xa, 0x0, 0x8c230100, @loopback={0x11000000, 0x7ffff004}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)="be", 0x1238c}], 0x1, 0x0, 0x0, 0x1238c}, 0x60) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000340)=r2) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) [ 598.965305][ T6780] 8021q: adding VLAN 0 to HW filter on device team0 [ 599.091001][ T4272] Bluetooth: hci0: command 0x041b tx timeout [ 599.254036][ T6780] bond0: (slave team0): Enslaving as an active interface with an up link [ 599.304411][ T6786] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 599.325939][ T6786] bond0: (slave team0): Releasing backup interface [ 599.357291][ T6786] bridge0: port 3(team0) entered blocking state [ 599.357359][ T6786] bridge0: port 3(team0) entered disabled state [ 599.364579][ T6786] device team0 entered promiscuous mode [ 599.364596][ T6786] device team_slave_0 entered promiscuous mode [ 599.364717][ T6786] device team_slave_1 entered promiscuous mode 17:20:34 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x3, 0x0, 0x3}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:34 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') 17:20:34 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 601.159059][ T4939] Bluetooth: hci0: command 0x040f tx timeout [ 603.238518][ T4939] Bluetooth: hci0: command 0x0419 tx timeout [ 603.318632][ T3639] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 605.730253][ T3635] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 605.731991][ T3635] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 605.732604][ T3635] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 605.733531][ T3635] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 605.733998][ T3635] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 605.734242][ T3635] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 605.849125][ T6804] chnl_net:caif_netlink_parms(): no params data found [ 605.891694][ T6804] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.891770][ T6804] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.892512][ T6804] device bridge_slave_0 entered promiscuous mode [ 605.893951][ T6804] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.894023][ T6804] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.894648][ T6804] device bridge_slave_1 entered promiscuous mode [ 605.945262][ T6804] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 605.947216][ T6804] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 605.981342][ T6804] team0: Port device team_slave_0 added [ 605.982617][ T6804] team0: Port device team_slave_1 added [ 606.001860][ T6804] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 606.001875][ T6804] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 606.001903][ T6804] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 606.004002][ T6804] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 606.004016][ T6804] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 606.004043][ T6804] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 606.092596][ T6804] device hsr_slave_0 entered promiscuous mode [ 606.101191][ T6804] device hsr_slave_1 entered promiscuous mode [ 606.107049][ T6804] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 606.107074][ T6804] Cannot create hsr debugfs directory [ 606.192231][ T6804] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.192270][ T6804] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.192367][ T6804] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.192414][ T6804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.244377][ T6804] 8021q: adding VLAN 0 to HW filter on device bond0 [ 606.253353][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 606.254316][ T4938] bridge0: port 1(bridge_slave_0) entered disabled state [ 606.255165][ T4938] bridge0: port 2(bridge_slave_1) entered disabled state [ 606.256816][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 606.292541][ T6804] 8021q: adding VLAN 0 to HW filter on device team0 [ 606.305724][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.306039][ T4938] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.306073][ T4938] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.306336][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.306579][ T4938] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.306612][ T4938] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.342782][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 606.343529][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 606.349187][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 606.355479][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.360440][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.366326][ T6804] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 606.389218][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 606.389356][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 606.404362][ T6804] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 606.663658][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 606.664519][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 606.665279][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 606.665851][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.671506][ T6804] device veth0_vlan entered promiscuous mode [ 606.677578][ T6804] device veth1_vlan entered promiscuous mode [ 606.697265][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 606.697916][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 606.699212][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 606.703816][ T6804] device veth0_macvtap entered promiscuous mode [ 606.707419][ T6804] device veth1_macvtap entered promiscuous mode [ 606.731206][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 606.731234][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.731242][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 606.731256][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.731267][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 606.731281][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:20:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xe7, &(0x7f0000000080)=""/231, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1e, 0x0, 0x4, 0x1100001, 0x0, 0x1}, 0x48) 17:20:41 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000980)={0xffffffffffffffff}, 0xc) 17:20:41 executing program 5: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc, 0x6, 0x1000}, 0x0, 0xffdfffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000feffffff000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x660c, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) sendmsg(r0, 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000bc0)={&(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000b40)=[{&(0x7f00000005c0)="020836f041d5263dbb459428a55bbc40cd4ab024d77e72ce589a70acdb12ada4bae30d8c333a29b6cb5006", 0x2b}, {&(0x7f0000000840)="7b281947e6a611495e6ebdcbd7fc0a1f37a89f27a809826dabcb77cbc2e2a2e26e8714184ff73034950b6729da03a58827c8576ea95f64941b9546f9a44f34789d9143da8dd5073b02945d49efcc2c05d8e846b209fe8258f0bc8c98c4af0f2c08f7977b701cdbb4c4aad441e5c32b0102f517a365471558fb998167ef422b971aecf916e74ddcdb8321969c17a8bf6a1535bb450d69cc10a9c502144c244f1fb33792070c59269ab8634a37c8c2", 0xae}, {&(0x7f0000000900)="7fd3a5e53e69c1b27ad2b2f480a6040bf81d0bca9171305304866da4dcd0bf83023ff9e83d7da914ab60dfaea9148e78d6409dbb5bd876e8231cee4c27f4c0f8e944b85fe1169eb644ad174b100076435c45c567c71279b679203d0ffda0a8abc1299d894c06", 0x66}, {&(0x7f0000000980)="822b2d87ef1933708e9f8eadd91dc2c955a13cb49eaa80c47e5a73cb80273c8d1589589cd35c5d6af2c57310bf6c6abecfef69cfcb773486fa64525658ff39fb66ae0daa342b49471fedd2bd7a6893be658bb0d8230548d8170715945ae5732a0c1bb8062784fbbd371d2e1c0c908ff298ff7dc1cd220775108d740a6e5e8fc40ed7f6ef2c1b3fae089ac91989576f3d1d633b9c318b880d2ec826752cbcb7de5d36a88b6c286c84f243b68bddac", 0xae}, {&(0x7f0000000a40)="d80e39ddee95437523e50bab64442b4cc276343e2b0d7bad5693ea49afc88625e05640d2406f7ee5fee2331f35aeaff41432f925423f3b76240ff476a782e639bb8e640733e09d100da777f819b4761f1902e4465c78b72ab07dc09ca47068232949fa5730443678c490cf82ff5b7d0feac9e1105bea4d0e", 0x78}, {&(0x7f0000000ac0)="4af3f69428853533af8000174dff52a64ae822360fd5bac47d47a04dcee00b64a0b66ef6c73dab18c96cd4e86fc8f6542a26340a89276e52ba928c5cf167fe46c9eff0db53e71e5e8f4e", 0x4a}], 0x6}, 0x800) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001b80)=ANY=[], 0x380}, 0x40001) sendmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@nl=@kern={0x10, 0x0, 0x0, 0x20000000}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000240)="fd13099630131d4068b71950aa5311eca284499c0e18b2a938f6809a225b8c4b49c385eb90b892e4e287904d0212d64d6f5a3d73314250bb0be99e05a700d56ef8bfe876b57d7dc000b742f48eb1debe28a9b7278f528091cb340cd79b766edd43001999f7a0654ed7b66d4101b93243360d4cacd5d29e406d08e411eb3cd42785f64c3e3c48153fa0d6cae809dfb450fef11061b4c2028eb40a417919f12c0d8d445ba7bde7344654ce0ae8b89587189854e82b7be93017d0ca8c636af17ba11ba8e6373413890c33c10669abf84cc1e030b82ca5b9ea0d7abf9c2537b399ddaa5ec160f09376", 0xe7}, {&(0x7f0000000440)="bc5d838294280be712a17c3ef09f4bf5cb73d510021b10cfaaa6948a7a52e94f8cef9a71bfa97756d25e6d671a5aeb62d69762af326d0336879a493841fb99ad59ab817988cf8a5b3ae35f11b3801a35d486773abce7d7b712ed47daa2cb4c99d153feb779766bec3d7daf5eef9c66b30385be679e14f38781382101b4cb038463ceb5104a94ea31da497d7e78e8899bd7fff3fd72892f8e1220295fc51417a3f43d636a53cac11de6c145ce0aaf65fb", 0xb0}, {&(0x7f0000000640)="06a79b2e7dbe1fec078333a2263ad4726275fca43f5040b3eff9812ff71dca0936f1f2ed1554448ca4fd7399a2b3b700eb894045697b50d8a66d0d963028973bf4cd9edfb33d95434f33db10952164479ae5d8b14776407cf731150b3fadf508112ab75f171aab5743ad5d7f6f48cd1ee4e332fb4d099c4130250c51d2584caabffe226bb18f341fdfb8f2f7c44bffba8585e750cf4e573765a05b0e00b58722016da970f7b33fba13c3c40a2bac2e45f1a65e3bb2244b0806e1021051fc1d41fc9f768975826d91cc9e57537f03aed9d05341983c238f51d4abecc2831e862a415c93", 0xe3}, {&(0x7f0000000040)="6a010f635b7019e9da11ca4ae1e46d024362791ad0feb5a99c3e38d8", 0x1c}], 0x4}, 0x8080) 17:20:41 executing program 4: syz_clone(0x58000000, &(0x7f00000001c0)="07577ae85283a8d21d031731683b05ae275b030d424a1c58", 0x18, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="fded1b10f25be7dc2109b6a5b63b77") 17:20:41 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)='C', 0x1}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/145, 0x91}], 0x1}, 0x0) [ 606.731290][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 606.731302][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.731311][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 17:20:41 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 606.731375][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:20:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01001800000000000000600000006000000005"], &(0x7f0000000180)=""/161, 0x7d, 0xa1, 0x68}, 0x20) 17:20:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 606.733370][ T6804] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 606.733485][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 606.734894][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready 17:20:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}, @fwd]}}, &(0x7f0000000080)=""/193, 0x42, 0xc1, 0x1}, 0x20) [ 606.738354][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 17:20:41 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x63}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:41 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x1, &(0x7f0000000280)=@framed={{}, [@generic, @alu, @cb_func]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa8, &(0x7f00000002c0)=""/178, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x10, 0x0, 0x5c}, 0x80) [ 606.738373][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:20:42 executing program 2: syz_clone(0x11800000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 606.740801][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 606.740817][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.740829][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 606.740843][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.740854][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 17:20:42 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0xa, 0x0, 0x0, 0x74}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:42 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1184}, 0x48) [ 606.740867][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.740877][ T6804] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 606.740890][ T6804] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 606.742581][ T6804] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 606.742884][ T4938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 606.825000][ T93] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 606.825021][ T93] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 606.827561][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 606.866959][ T8] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 606.866979][ T8] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 606.871652][ T4480] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 606.994875][ T6832] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 607.002656][ T6832] device team0 left promiscuous mode [ 607.002728][ T6832] device team_slave_0 left promiscuous mode [ 607.006789][ T6832] device team_slave_1 left promiscuous mode [ 607.013671][ T6832] bridge0: port 3(team0) entered disabled state 17:20:42 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000880)={0x0, 0x0, 0x18}, 0x10) 17:20:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000001680)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000006000000000000000000000300000000030000000400000008000000000000000d0000000000000000000000030000000002000000030000003f0040b89191cf1a"], &(0x7f00000001c0)=""/244, 0x5a, 0xf4, 0x1}, 0x20) 17:20:42 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], 0x0, 0x84}, 0x20) 17:20:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000180)=""/161, 0x7d, 0xa1, 0x68}, 0x20) 17:20:42 executing program 3: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 17:20:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) [ 607.264269][ T6832] 8021q: adding VLAN 0 to HW filter on device team0 [ 607.384527][ T6832] bond0: (slave team0): Enslaving as an active interface with an up link [ 607.457160][ T6841] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 17:20:42 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000100)=@raw=[@alu={0xa66157c0dc91c7cd, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x59) 17:20:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x63}]}}, &(0x7f0000000080)=""/130, 0x2a, 0x82, 0x1}, 0x20) [ 607.489779][ T6841] bond0: (slave team0): Releasing backup interface 17:20:42 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000007780)={&(0x7f0000000000)=@caif, 0x80, 0x0}, 0x0) 17:20:42 executing program 1: syz_clone(0x0, &(0x7f0000000100)="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", 0x1000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000001100)="8fe8ac8299c7854695ce74a6d0c8a07c6282c5693dc945eeafce00fac5da3c788cb940e2999c2bcb21e06156ef9601f09b16adf5e018c64d6f111b7dd49b33ec2b91b8c76abe3782deef2bc37da22ea049e6e558c2dff8fa2a4019de8ca42536b4202195061463") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000012c0)={0x0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000001280)='z&]-\x00'}, 0x30) syz_clone(0x40000000, &(0x7f0000001300)="9726230f04ea3a9e0282fe9da5e42e870dae1085e04d5ad902ea0e8b57f95bd5437cb2d7c268a1912877406ab981aab4a96ce49393d760ae02d34eb9561bbeb43a88f1ceb09ca3a42d7f", 0x4a, &(0x7f0000001380), &(0x7f00000013c0), &(0x7f0000001400)="8964650fc3a4858f0126f2fec9b525211359ab9a5c7a0ed498b9b1c0f2ee085f988dc6f9bfdb47e130ac61e0789482dfed539ce195a5ef83edf26498a3279a0ea393e18fe32b46983b7e05c0d89c6f206759ca944738da9600c1bdb3aafb4440fe14bd5b32ad737c3a057e64b92c8a9f32e69945111dff8b233e31d6292063e94a886ff54eb8d553e46ea0192a603b129ad01ee7304d1941443b8265b49637f12be9707d292aaae026e4feda16ee1c79f00664a9c8d378cdd422d100207ecbebb3b5e11a") 17:20:42 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x25, 0xa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 607.541233][ T6841] bridge0: port 3(team0) entered blocking state [ 607.541305][ T6841] bridge0: port 3(team0) entered disabled state 17:20:42 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0xc6802, 0x0) 17:20:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) [ 607.542262][ T6841] device team0 entered promiscuous mode [ 607.542274][ T6841] device team_slave_0 entered promiscuous mode [ 607.542388][ T6841] device team_slave_1 entered promiscuous mode 17:20:42 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x22c00, &(0x7f0000000100)=@framed={{}, [@exit]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 607.799391][ T4939] Bluetooth: hci4: command 0x0409 tx timeout 17:20:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) 17:20:42 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f00000001c0)={0x0, 0x0, 0x84, 0x0, 0x1}, 0x20) 17:20:42 executing program 5: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='.\x00'}, 0x10) 17:20:43 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f00000001c0)={0x0, 0x0, 0x84}, 0x20) 17:20:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1, 0x5}, {0xd, 0x3}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) 17:20:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) 17:20:43 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000180)=""/245, 0x29, 0xf5, 0x1}, 0x20) 17:20:43 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000080)=""/130, 0x2a, 0x82, 0x1}, 0x20) 17:20:43 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x10}, 0x48) 17:20:43 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xd, 0x1, 0x4, 0x80000000, 0x0, 0x1}, 0x48) 17:20:43 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1184, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xe}, 0x48) 17:20:43 executing program 2: bpf$BPF_BTF_LOAD(0x5, 0x0, 0x0) 17:20:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@base={0x9, 0x0, 0x0, 0x0, 0xa4}, 0x48) 17:20:43 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000100)=@framed={{}, [@exit]}, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x30c0, 0x0) 17:20:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000480)=""/143, 0x29, 0x8f, 0x1}, 0x20) 17:20:43 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, [], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:43 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0xa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file1\x00'}, 0x10) 17:20:43 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0xa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 0: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a41555662fb") 17:20:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "bd"}]}}, &(0x7f0000002600)=""/147, 0x2a, 0x93, 0x1}, 0x20) 17:20:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @func={0x9}]}}, &(0x7f0000000300)=""/137, 0x3e, 0x89, 0x1}, 0x20) 17:20:43 executing program 3: syz_clone(0x40020000, &(0x7f0000000000)="9e7fa59ea4a4270abfdec8ffedda13d8fd8e38", 0x13, &(0x7f0000000040), 0x0, &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a41555662fbe3") 17:20:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000002600)=""/147, 0x2e, 0x93, 0x1}, 0x20) 17:20:43 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 17:20:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000060000000600000000500004c"], &(0x7f0000000180)=""/161, 0x7d, 0xa1, 0x68}, 0x20) 17:20:43 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000000)=@raw=[@ldst={0x3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x1, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x2}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010218"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x0, 0x4}, 0x48) 17:20:44 executing program 0: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a41555662fb") 17:20:44 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xf4240, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:44 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000100)=@raw=[@generic={0x3}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x90, &(0x7f0000000000)=""/144, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:44 executing program 3: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, &(0x7f0000000000)="9e", 0x1, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a4155") 17:20:44 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x2}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000cc000000cc000000070000000000000000000003000000000100000001"], &(0x7f0000000480)=""/150, 0xeb, 0x96, 0x1}, 0x20) 17:20:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xf}]}]}}, &(0x7f0000000080)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 17:20:44 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x2, &(0x7f0000000100)=@framed={{}, [@exit]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000480)=""/143, 0x1a, 0x8f, 0x1}, 0x20) 17:20:44 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x25}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:44 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000015f15fa49000000000000095"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:44 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 17:20:44 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) [ 609.878661][ T4938] Bluetooth: hci4: command 0x041b tx timeout 17:20:45 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], 0x0, 0x84}, 0x20) 17:20:45 executing program 2: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 17:20:45 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x0, 0x0, 0xf188}, 0x48) 17:20:45 executing program 0: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a41555662fb") 17:20:45 executing program 5: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:45 executing program 3: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, &(0x7f0000000000)="9e", 0x1, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a4155") 17:20:45 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63000000}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x7, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7}]}]}}, &(0x7f0000002600)=""/147, 0x2e, 0x93, 0x1}, 0x20) 17:20:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000181a0000", @ANYRES32, @ANYBLOB="00faffffffffffffff8e4000ffffffff1812008084f03e52e1"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:45 executing program 4: bpf$BPF_BTF_LOAD(0x9e, 0x0, 0x0) 17:20:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x1}]}}, &(0x7f0000000480)=""/143, 0x26, 0x8f, 0x1}, 0x20) 17:20:45 executing program 4: syz_clone(0x40020000, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a415556") 17:20:45 executing program 2: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 17:20:45 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:45 executing program 5: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:45 executing program 0: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a41555662fb") 17:20:45 executing program 3: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, &(0x7f0000000000)="9e", 0x1, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a4155") 17:20:45 executing program 1: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:46 executing program 1: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 17:20:46 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000002cc0)={0x0, 0x0, 0x24}, 0x82) 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x61}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:46 executing program 4: syz_clone(0x40300000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0xa, &(0x7f0000000380)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:46 executing program 2: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 17:20:46 executing program 5: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:46 executing program 3: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, &(0x7f0000000000)="9e", 0x1, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a4155") 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 17:20:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x4, &(0x7f0000000280)=@framed={{}, [@generic={0x20}]}, &(0x7f0000000040)='syzkaller\x00', 0x2, 0xb2, &(0x7f00000002c0)=""/178, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x79}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 611.959109][ T4938] Bluetooth: hci4: command 0x040f tx timeout 17:20:46 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:46 executing program 4: syz_clone(0x40300000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0xe}]}}, &(0x7f0000000080)=""/130, 0x2a, 0x82, 0x1}, 0x20) 17:20:46 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@func], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010064000000000000006800000068"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:47 executing program 2: syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 17:20:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0, 0x58}, 0x20) 17:20:47 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:47 executing program 5: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:47 executing program 0: syz_clone(0x10180000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)='6') 17:20:47 executing program 4: syz_clone(0x40300000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:47 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:47 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x87}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:47 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000140)=@raw=[@ldst={0x3, 0x0, 0x6}], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:47 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x4}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8d, &(0x7f00000002c0)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:47 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000100)=@raw=[@alu={0xa66157c0dc91c7cd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x59) 17:20:47 executing program 0: syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:47 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0x0, 0x8}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:47 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], 0x0, 0x84}, 0x20) 17:20:47 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{}, [], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 1: bpf$BPF_BTF_LOAD(0x15, 0x0, 0x0) 17:20:48 executing program 4: syz_clone(0x40300000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x17, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x9, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="184b0000faffffff0000000000000000181a0000", @ANYRES32, @ANYBLOB="0000f2"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 1: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)) 17:20:48 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x16, 0x0, 0x4000, 0xd}, 0x48) 17:20:48 executing program 0: syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7, 0x1}]}]}}, &(0x7f0000002600)=""/147, 0x2e, 0x93, 0x1}, 0x20) 17:20:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000007000000000000000300000d"], &(0x7f0000000140)=""/172, 0x43, 0xac, 0x1}, 0x20) 17:20:48 executing program 5: bpf$BPF_BTF_LOAD(0xf, 0x0, 0x0) 17:20:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000002600)=""/147, 0x26, 0x93, 0x1}, 0x20) 17:20:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002cc0)={0x0, 0x0, 0x40000000}, 0x20) 17:20:48 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0xf, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/143, 0x0, 0x8f, 0x1}, 0x20) 17:20:48 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=""/233, 0x84, 0xe9}, 0x20) 17:20:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter, 0x48) 17:20:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000010"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) [ 614.038829][ T4938] Bluetooth: hci4: command 0x0419 tx timeout 17:20:49 executing program 0: syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:49 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@kfunc]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func]}}, &(0x7f0000000300)=""/137, 0x26, 0x89, 0x1}, 0x20) 17:20:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xd, 0x3}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) 17:20:49 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0xe655444b6616ae96, 0x0) 17:20:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0xf}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x41}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xd, 0x3}]}]}}, &(0x7f0000000080)=""/193, 0x2e, 0xc1, 0x1}, 0x20) 17:20:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000068680000006800f4"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000026c0)={&(0x7f0000002540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000002600)=""/147, 0x2e, 0x93, 0x1}, 0x20) 17:20:49 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 0: syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:49 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000000)=@raw=[@func], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x97, &(0x7f0000000140)=""/151, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 1: syz_clone(0x40020000, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f00000000c0)) 17:20:49 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f00000001c0)={0x0, 0x0, 0x84}, 0x20) 17:20:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febed0318"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:49 executing program 4: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x12, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:49 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000100)=@raw=[@alu={0xa66157c0dc91c7cd, 0x0, 0x0, 0x0, 0xb, 0xffffffffffffffff}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x59) 17:20:49 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f00000001c0)={0x0, 0x0, 0x84, 0x0, 0x1}, 0x20) 17:20:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000006800000068000000040000000a00002239000007"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000007000000000000000300000d000000000d000000030000000100000005000000030091ff8b"], &(0x7f0000000140)=""/172, 0x43, 0xac, 0x1}, 0x20) 17:20:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000300)=""/137, 0x32, 0x89, 0x1}, 0x20) 17:20:50 executing program 3: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:50 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1, 0x5}]}, @fwd={0x1}]}}, &(0x7f0000000080)=""/193, 0x3a, 0xc1, 0x1}, 0x20) 17:20:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xc}]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000000080)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 17:20:50 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x8, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=""/233, 0x84, 0xe9}, 0x20) 17:20:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f02002c000505d25a80648c63940d0a24fc6010003d020a000a00053582c137153e3702480380471301000200", 0x33fe0}], 0x1}, 0x0) 17:20:50 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x586, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)=0x38bd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xfffffffffffffff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x0, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="0e6200000f00000000fd006a1567492f87bad1da00ff035485f34d5178b93505ffb7128749cb5c09bf1966dd72430f050000b2"], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4000005}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x7c, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)}, 0x80) 17:20:50 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@func], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x5, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x5, &(0x7f0000000000)=@framed={{}, [@map_idx_val]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xe7, &(0x7f0000000080)=""/231, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x4, 0x0, 0x0, 0x0, 0xa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8d, &(0x7f00000002c0)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb020018"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:50 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 615.501297][ T7247] netlink: 128952 bytes leftover after parsing attributes in process `syz-executor.1'. [ 615.501321][ T7247] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 17:20:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={0x0, &(0x7f0000000080)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 615.501337][ T7247] netlink: 13494 bytes leftover after parsing attributes in process `syz-executor.1'. 17:20:50 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[], &(0x7f0000000180)=""/161, 0x7d, 0xa1, 0x68}, 0x20) 17:20:50 executing program 1: bpf$PROG_LOAD_XDP(0x11, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) 17:20:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000180)=""/245, 0x28, 0xf5, 0x1}, 0x20) 17:20:50 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x586, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)=0x38bd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xfffffffffffffff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x0, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="0e6200000f00000000fd006a1567492f87bad1da00ff035485f34d5178b93505ffb7128749cb5c09bf1966dd72430f050000b2"], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4000005}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x7c, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)}, 0x80) 17:20:50 executing program 5: socketpair(0xa, 0x2, 0x6, &(0x7f0000000300)) 17:20:50 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000100)=@raw=[@exit], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x80, &(0x7f0000000200)=""/128, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:50 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0xe401, &(0x7f0000000100)=@framed={{}, [@exit]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000480)=""/143, 0x26, 0x8f, 0x1}, 0x20) 17:20:50 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x2000020d, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:50 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x1, &(0x7f0000000100)=@raw=[@jmp], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {0xd, 0x3}]}, @fwd={0x1}]}}, &(0x7f0000000080)=""/193, 0x42, 0xc1, 0x1}, 0x20) 17:20:50 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000000)=@raw=[@call], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x586, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)=0x38bd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xfffffffffffffff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x0, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="0e6200000f00000000fd006a1567492f87bad1da00ff035485f34d5178b93505ffb7128749cb5c09bf1966dd72430f050000b2"], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4000005}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x7c, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)}, 0x80) 17:20:50 executing program 5: socketpair(0xa, 0x2, 0x6, &(0x7f0000000300)) 17:20:50 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x31, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0x0, 0x9}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000007000000000000000300000d000000000d00000003"], &(0x7f0000000140)=""/172, 0x43, 0xac, 0x1}, 0x20) 17:20:50 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x22c00, &(0x7f0000000100)=@framed={{}, [@exit]}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:50 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 3: bpf$BPF_BTF_LOAD(0xa, 0x0, 0x0) 17:20:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@enum={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}]}}, &(0x7f0000000080)=""/130, 0x2a, 0x82, 0x1}, 0x20) 17:20:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000e8"], &(0x7f00000000c0)=""/233, 0x84, 0xe9, 0x1}, 0x20) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000cc000000cc0000000700000000000000000000030000000001"], &(0x7f0000000480)=""/150, 0xeb, 0x96, 0x1}, 0x20) 17:20:51 executing program 2: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x586, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1b}, 0x204}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000380)=0x38bd) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xfffffffffffffff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_subtree(r0, &(0x7f0000000580)=ANY=[], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.net/syz1\x00', 0x1ff) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x5f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0xc800, 0x3, 0x5, 0x8, 0x101, 0x9e0, 0x0, 0x0, 0x1000, 0x0, 0x9}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x2, &(0x7f0000000280)=ANY=[@ANYBLOB="0e6200000f00000000fd006a1567492f87bad1da00ff035485f34d5178b93505ffb7128749cb5c09bf1966dd72430f050000b2"], &(0x7f00000001c0)='syzkaller\x00', 0x7f, 0xce, &(0x7f0000000440)=""/206, 0x40f00, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x1, 0x4000005}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x9, 0x7c, 0xfffffffd}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000005c0)}, 0x80) 17:20:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x29}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 5: socketpair(0xa, 0x2, 0x6, &(0x7f0000000300)) 17:20:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x5}, {}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 17:20:51 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0xa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0xa}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 17:20:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x110) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 17:20:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x8) 17:20:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x3}]}]}}, &(0x7f0000000080)=""/193, 0x36, 0xc1, 0x1}, 0x20) 17:20:51 executing program 2: syz_clone(0x90004000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:51 executing program 5: socketpair(0xa, 0x2, 0x6, &(0x7f0000000300)) 17:20:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB=']'], &(0x7f0000000040)='syzkaller\x00', 0x2, 0xa8, &(0x7f0000000080)=""/168, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x1}]}}, &(0x7f0000000080)=""/193, 0x26, 0xc1, 0x1}, 0x20) 17:20:51 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x3}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000080)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 17:20:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15, 0x0, 0x2}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={0x0, 0x0, 0x5f5e0ff}, 0x20) 17:20:51 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f00000001c0)={0x0, 0x0, 0x84}, 0x20) 17:20:51 executing program 4: bpf$BPF_BTF_LOAD(0x2, 0x0, 0x0) syz_clone(0x40020000, &(0x7f0000000000)="9e7fa59ea4a4270abfdec8ffedda13d8fd8e3818db3df08f0f", 0x19, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="01be151a22c03e91aaa918532c5e03f538f7142cf4e6624e3bc26e38bf0bdbe261f6382b8ecac3e6e893e0af6832784cfdbf6bf1695684d09efd6f01495423146511aad8c61ca136d82ea098d9524e279a41555662fbe3df") 17:20:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x0, 0xb35616c0ba81917c}, 0x48) 17:20:52 executing program 0: syz_clone(0x90004000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="137138cd35e82a5c23930b8a005c4ea6c8a66006517d90eb3fb3cc80c135ae054d767b2d433b71309aacf55f4e9013343c995e4655806b7bcc1027c6997b738a8e1d6a6caf6ba1c4f716bf8cb06b1b5b6038a16166af8edcaadc697a3674abfe931554245e227571a390033fcae1110046b6d59ae9cf82fb1d1f8795e13182c4670092def18cabb499c3c2c135ca48a6fdd00aa60e3ec6c3213c84c75ee2776b5528b3da9750e2c20a1220aea2ceebbfbfcfa52101fc2a8d1aefcb156ff09b75abfdeb14502436e91ff6a4e5f77085aa8c51f25bbcf999525cf5d94b3ed3dd34fba0f367ffecf7eef52ff5b443fe490a0478b62ea89dd6270761b4dabcd7c992f335d650592cd374154e41bd79596263c98c3bc59a359256f2b08cf41efe8ee2893bda1ed9dee30810e3bb55b047c1831fe0cce12d7afae005822df36991969b3374af241530f1f8db72a6fc54e5e8fb5e7c2afba54a1d5929cb14b90ca4d9c3a90564965fbfec08ae17a0d9735a4bdf8103bc1f6e2cd657aecf4c6587897496f0efc11e0c45ade18253e4f5168bc06fd5cfe00e4de36f0002ea27ec7b68c92ad0f9388f1fbddfd59c8b3f2b56cda058fd6b9538345c0bff2f462d7b10230e3b943942d2e67e219dc980f469fc12a0bac27dcea774b4b77816ef3f481973148bdf6cc3e50fef6c2446c352b326686fb1c1159a60f24e4062839aaf3301ee169bbca7f739870cb27973c1226a5d71d54dda25d3b416771ec8daf20d8e0839471e885088fefe3e62a6de07de7e2bbc519684cde21e7c3145f3e63c5c213aae0e7082ad28021e45bb72d444fe47e7c78dc72d1b70f93efb7dcde5595b78859626fc6c964a60e3cfa741ec355514165b4ba26a090cb514efab2bbb7b98620f225f9956fd31005be05c7104a42e9af69bbdb02f4f36179e78c07af1a91a7e718a154f8c3f3b8f7aefa86717c177d85897c32963715a9f3fae998ab1060676a002cc346e518ff35ba9ceae8f3286f85c212354f26ad42ba1687a3fbd5116d59a7fd708bb545cc0342068513cd8b075136219125ce912d123d5b38e61cb8bb0959dd3c5da75ef32b0d5104a74a4485101edadd66b62c8f935b19acd693ed7915bf8e7804bc63a23d84d613dbf7ed705ff8ee4d36f7aab44f89790bf9bb7521d5108f14d377834e20a73203b23dbf1a01f83b912e938dbd19ff56cc3d4891fbb1eb15a80fc036cc9251170921b2617d5d2e8faf088a85ce496762699f278297313a43dd4dd4428e594f8f8bb0f77d149a9d1a67f7922de5e7b56c162f43297982b8d36f025de734c4790709cec97a66e635a8574cbb73be1da9848d1322b7b837c315a6c2fc708b95e2bb648a252df79d1ece24d372a71fe1f32007d7ddb980d81d1b71344b488e0714f49fd93a2462c605beeacd89b62a9a4a4206b3b64c42cdddc8ce90b9479328e03aa5019a1f6e17e36f6d0306fae248fbbd44091a22058751028420fad34ae77574f644d5da7d3a4fcb3a9fe1a6dafd890c6772dffc7f178131ac340325fbb3464bcd682ee6a7985c1bab262d1d826304bd5a3d5d20ef28e361f75b9e17263de516fe085f6f47d2df4ff34a6d0b8824044da4a8529b5200e1906824011a75a23f91c05a1d1f65430643ac1a2c063a516daebdff76c990bf7b741282ca124fda437c896a6f3797e60b954640b95d8b148c55d56f547102c048a56f20a16181eb181d93506883f91dec7d3c5763c7d1da9095772c33bb4ef9c3185384b682bcdde7ca40521ac758fa93f82e7627bcb265832c93aa7ad20b8b676aa7bec142add994c0b382db23c1dc3a106ef5b6533b8e1288d5c561f1897e44a6a6422bf620acd5d6a6373179b7c7a98641bace3d9d617f2970cb5633242537b046efd5adaa2cf41e10250dd74da54912576ad52048391e7f21ea10d9fff1659869428520489fb41964a481e2410df3c0d8bd781daa814781ed81f5c884f7514754afae0f491d0a18299c95d2fb5aef3ec76fcec559ff2b3b8b8bcf4ee485d21b27139d6a26d1836150fbae80db98fb1c92b610873c3f211fb9d1fc6ae9830ba395067775efdc3b858797c0c1ce214fe7adf9b67fbae94d81bccae30fc53361c9cb10a9f211215a1c467ea95845dc042b0fe5a2ac7a723a0df9937b844a11ce030a8c5d6c713b6c9ceb6d24d1b83123cea763227f50575e21d3e63a936b94e1e0e36b7641e91e4987030af3699e983c698a18f94bd823dcedae83e0c251d4e31aca9cf34c44a2560ef2aaefc90939e4127dd0a60047e46efad1c67140952b7e07b300a268592873c380cbf98ef1d360d2ab603d6769345cf8127ec68779921087e1c380c3051ff63dc6c35c7302c4b29bd7464688fcd219619af99914fa7c8c8b62da95ca78a04ae8a3ba7276d740918d4144312fcd3b9eedaeae1c9db9befaf26830cd36b511561f180941343db8d2fefdf2120") 17:20:52 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:52 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f00000001c0)={0x0, 0x0, 0x84}, 0x20) 17:20:52 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x85ffffff}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{}, [], {0x95, 0xa, 0x0, 0xd00}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x2, &(0x7f0000000100)=@raw=[@func, @generic={0x3}], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x90, &(0x7f0000000000)=""/144, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 2: socketpair(0xf, 0x3, 0x0, &(0x7f0000000280)) 17:20:52 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x16}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f00000002c0)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{}, [], {0x95, 0xa, 0x0, 0xd00}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01001800000000000000cc000000cc00000007000000000000000000000300000000010000000100000007000000070000000000000c"], &(0x7f0000000480)=""/150, 0xeb, 0x96, 0x1}, 0x20) 17:20:52 executing program 4: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x85, &(0x7f0000000200)=""/133, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000080)=""/193, 0x26, 0xc1, 0x1}, 0x20) 17:20:52 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[], 0x0, 0x84}, 0x20) 17:20:52 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{}, [], {0x95, 0xa, 0x0, 0xd00}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 0: syz_clone(0x10180000, 0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180)='6') 17:20:52 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:52 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{}, [], {0x95, 0xa, 0x0, 0xd00}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x3, 0x0, 0x4, 0x0, 0x4}, 0x48) 17:20:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11}, 0x48) 17:20:52 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0x15}], {0x95, 0xa}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x94, &(0x7f00000002c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @func]}}, &(0x7f0000000300)=""/137, 0x3e, 0x89, 0x1}, 0x20) 17:20:52 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:20:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}]}}, &(0x7f0000000300)=""/137, 0x32, 0x89, 0x1}, 0x20) 17:20:52 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001500)={0x0, 0x0, 0x28}, 0x10) 17:20:53 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x6) 17:20:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) 17:20:53 executing program 3: socketpair(0x0, 0x7fffe, 0x0, 0x0) 17:20:53 executing program 2: syz_clone(0x800400, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:53 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, r0, 0x0) 17:20:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_vlan\x00', 0x1}) 17:20:53 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 17:20:53 executing program 0: syz_clone(0x8100080, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'netpci0\x00', 0x2021}) 17:20:53 executing program 4: perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 17:20:53 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x3) 17:20:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:53 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x3) 17:20:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'macvlan0\x00'}) 17:20:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETIFINDEX(r0, 0x400454da, 0x0) 17:20:53 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x3) 17:20:53 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000080)) 17:20:53 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x3) 17:20:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 17:20:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'rose0\x00', 0x400}) 17:20:53 executing program 4: syz_clone(0x200a000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 17:20:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00', 0x1}) 17:20:53 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) 17:20:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x1}) 17:20:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 17:20:54 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x0) 17:20:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000340)=0x1) 17:20:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETVNETLE(r0, 0x400454dc, 0x0) 17:20:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:20:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 17:20:54 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:20:54 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 17:20:54 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) 17:20:54 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') 17:20:54 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000040)) 17:20:54 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xf) 17:20:55 executing program 1: socketpair(0x10, 0x3, 0x2, 0x0) 17:20:55 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, r0, 0x0) 17:20:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xd) 17:20:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) 17:20:55 executing program 3: socketpair(0x23, 0x80005, 0x0, 0x0) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) 17:20:55 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x84000, 0x0) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 17:20:55 executing program 2: perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') 17:20:55 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) 17:20:55 executing program 3: syz_clone(0x4020a00, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:55 executing program 1: socketpair(0x10, 0x2, 0x3, 0x0) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 17:20:55 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x1}) 17:20:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000006c0), 0x48) 17:20:55 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x1) 17:20:55 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000340)) 17:20:55 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x127000, 0x0) 17:20:55 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000000)=0x1) 17:20:55 executing program 4: perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:55 executing program 0: socketpair(0x11, 0x2, 0x9, 0x0) 17:20:55 executing program 2: socketpair(0x2, 0x1, 0x2, 0x0) 17:20:55 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000340)={0xfffffff8}, 0x8) 17:20:55 executing program 4: syz_clone(0x10005000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 17:20:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x12, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 1: perf_event_open(&(0x7f0000000140)={0x7, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:56 executing program 0: perf_event_open(&(0x7f0000000100)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:20:56 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 17:20:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'virt_wifi0\x00', 0x1}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) 17:20:56 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6}], &(0x7f0000000080)='syzkaller\x00', 0x1, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x9}]}]}}, &(0x7f0000000280)=""/244, 0x32, 0xf4, 0x1}, 0x20) 17:20:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x8}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xac, &(0x7f00000000c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x1}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xac, &(0x7f00000000c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x8, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000280)=""/244, 0x2d, 0xf4, 0x1}, 0x20) 17:20:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@union={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/244, 0x2c, 0xf4, 0x1}, 0x20) 17:20:56 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000380)=ANY=[@ANYRESOCT], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x97, &(0x7f0000000140)=""/151, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB='\t'], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@generic={0x3}], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/244, 0x32, 0xf4, 0x1}, 0x20) 17:20:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x7300, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x3a0, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000200)=""/191, 0x26, 0xbf, 0x1}, 0x20) 17:20:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xc, [@union={0x7, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x0, 0x71, 0x2e]}}, &(0x7f0000000280)=""/244, 0x3c, 0xf4, 0x1}, 0x20) 17:20:56 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x15, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@generic={0x6}], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000005c9ef539c1"], &(0x7f0000000140)='syzkaller\x00', 0x2, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 2: syz_clone(0x0, &(0x7f0000000340)="1ed7750f2d932f8374cb9d33cc0a8d61df9eb46eb45c5239666758641e9bbba11bb68304947e0740ea", 0x29, 0x0, &(0x7f00000003c0), &(0x7f0000000400)="0cab1f7b9b5f91c5769a264b9c86877b23a86d1ce796b494578ab0c9c609b7b6a87c5ef205") 17:20:56 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xac, &(0x7f00000000c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x7300, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@kfunc], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xc0) 17:20:56 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x1, 0x8}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xac, &(0x7f00000000c0)=""/172, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x71]}}, &(0x7f0000000280)=""/244, 0x2e, 0xf4, 0x1}, 0x20) 17:20:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x2}]}}, &(0x7f0000000300)=""/246, 0x26, 0xf6, 0x1}, 0x20) 17:20:56 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@kfunc], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 4: socketpair(0x1, 0x0, 0x3, &(0x7f0000000440)) 17:20:56 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x2, 0x1, &(0x7f00000002c0)=@raw=[@kfunc], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001880)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000600)=@framed, &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:20:56 executing program 5: syz_clone(0xc008000, 0x0, 0x0, &(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)="810ba0aa397c7e002abc71bf9866463ee6a07d4a752fe56a6cde723935d33d8ff7829f05b5eb9f11947c2272c4499df1d470420038af7c2f6319aac8ee96bd2688de39141451fc5c292e678e23eb078f6ee00515086d609c2b0a5abc6bec4d5ef7ab4265a9e37f671cfce3") 17:20:56 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_tracing={0x1a, 0x3, &(0x7f0000001240)=@framed, &(0x7f0000001280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7, 0x0, 0x0, 0x0, 0x1001}, 0x48) 17:20:56 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f0000001800)={&(0x7f00000017c0)='./file0\x00', 0x0, 0x8}, 0x10) 17:20:56 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000004000)={0xffffffffffffffff, 0x0, 0x18}, 0xc) 17:20:56 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) 17:20:56 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/net\x00') 17:20:56 executing program 5: syz_clone(0xc008000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:56 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000d40)) 17:20:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x12, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:20:57 executing program 1: syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000400)='\f') 17:20:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x0, 0x3, &(0x7f0000001c80)=@framed, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x0, 0x0, 0x0, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x1, &(0x7f0000000040)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0xe}]}}, &(0x7f0000000300)=""/246, 0x26, 0xf6, 0x1}, 0x20) 17:20:57 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@kfunc], &(0x7f0000000040)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter, 0x48) 17:20:57 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={0x0, 0x0, 0x18}, 0x10) 17:20:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const]}, {0x0, [0x0]}}, &(0x7f0000000300)=""/246, 0x27, 0xf6, 0x1}, 0x20) 17:20:57 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000017c0)='ns/time\x00') 17:20:57 executing program 5: openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000700)='devices.deny\x00', 0x2, 0x0) 17:20:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000003600)) 17:20:57 executing program 2: syz_clone(0xc008000, 0x0, 0x0, &(0x7f0000000cc0), 0x0, 0x0) 17:20:57 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="0cab1f7b9b5f91c5769a264b9c86877b23a86d1ce796b4") 17:20:57 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000003600)) 17:20:57 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2}, 0x48) 17:20:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 17:20:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2, &(0x7f0000000040)=@raw=[@cb_func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x22, &(0x7f0000000100)=""/34, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x11, 0x3, &(0x7f0000001c80)=@framed, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000000)=""/24, 0x0, 0x18}, 0x20) 17:20:57 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x0, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:20:57 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f00000016c0)={&(0x7f0000001680)='./file0\x00', 0x0, 0x8}, 0x10) 17:20:57 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3667cd11595f8081, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:20:57 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2, &(0x7f0000000040)=@raw=[@cb_func], &(0x7f00000000c0)='GPL\x00', 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf}, 0x48) 17:20:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000003f80)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x36de432d8a0830df}, 0x48) 17:20:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000300)=""/246, 0x26, 0xf6, 0x1}, 0x20) 17:20:57 executing program 4: syz_clone(0x151200, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:57 executing program 1: syz_clone(0x10200, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:57 executing program 2: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000002340)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 17:20:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter, 0x48) 17:20:57 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000040)=@raw=[@cb_func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xb0, &(0x7f0000000080)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz1\x00', 0x200002, 0x0) 17:20:57 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), 0x0) 17:20:57 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000380)) 17:20:57 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000400)="0cab1f7b9b5f91c5769a264b9c86877b23a86d1ce796") 17:20:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2}, 0x48) 17:20:57 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@kfunc], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xb0, &(0x7f0000000080)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='GPL\x00', 0x9, 0xe1, &(0x7f0000000080)=""/225, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:57 executing program 2: syz_clone(0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400)="0cab1f7b9b5f91c5769a264b9c86877b23a86d1ce796b494578ab0c9c609b7b6a8") 17:20:57 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, 0x48) 17:20:57 executing program 3: openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000580), 0x2, 0x0) 17:20:58 executing program 4: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400)="0cab1f7b9b5f91c5769a264b9c86877b23a86d1ce796b49457") 17:20:58 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}, 0x48) 17:20:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001e40)={0x11, 0x3, &(0x7f0000001c80)=@framed, &(0x7f0000001cc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001e00), 0x10}, 0x80) 17:20:58 executing program 5: syz_clone(0x0, &(0x7f0000000340)="1ed7750f2d932f8374cb9d33cc0a8d61df9eb46eb45c5239666758641e9bbb", 0x1f, 0x0, 0x0, 0x0) 17:20:58 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x6, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0}], &(0x7f0000000040)='syzkaller\x00', 0x5, 0xb0, &(0x7f0000000080)=""/176, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2, &(0x7f0000000040)=@raw=[@cb_func], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7}, 0x48) 17:20:58 executing program 4: syz_clone(0x200000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) 17:20:58 executing program 5: syz_clone(0x8002000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000700)='ns/time_for_children\x00') 17:20:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x8, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x0, 0x3, &(0x7f0000000a40)=@framed, &(0x7f0000000a80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000b80)) 17:20:58 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0x1a9b35, &(0x7f0000000540)=@raw=[@func], &(0x7f0000000580)='GPL\x00', 0x0, 0xf3, &(0x7f00000005c0)=""/243, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 5: socketpair(0x1, 0x0, 0x0, &(0x7f0000000100)) 17:20:58 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 17:20:58 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0xc6300, 0x0) 17:20:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x12, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x0, 0x0, 0x0, 0x0, 0x104, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 17:20:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x2, &(0x7f00000000c0)=ANY=[], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x8e) 17:20:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x1e, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0xfff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 1: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000100), 0xfffffffffffffeef) 17:20:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xf4240, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)}, 0x80) 17:20:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x5, &(0x7f0000000000)=@framed={{}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 2: socketpair(0x1, 0x0, 0x3ff, &(0x7f0000000100)) 17:20:58 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x5, &(0x7f0000000140)=@framed={{}, [@btf_id]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 17:20:58 executing program 3: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001780)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 17:20:58 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7000000}, 0x80) 17:20:58 executing program 5: bpf$ITER_CREATE(0x21, &(0x7f0000001e00), 0x8) [ 624.121597][ T1229] ieee802154 phy0 wpan0: encryption failed: -22 [ 624.121647][ T1229] ieee802154 phy1 wpan1: encryption failed: -22 17:20:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x9, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0xb00, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:58 executing program 1: bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0xefc03b5ab0c0876d}, 0x10) 17:20:59 executing program 5: syz_clone(0xb09c0000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:20:59 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x20, &(0x7f0000000180)=""/32, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x0, 0x0, 0x0, 0x1060}, 0x48) 17:20:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x19, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000ac0)) 17:20:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000840), 0x10) 17:20:59 executing program 2: socketpair(0x3a, 0x0, 0x0, &(0x7f0000000140)) 17:20:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x5, &(0x7f0000000000)=@framed={{}, [@cb_func]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x9, 0x0, 0x0, 0x0, 0x88, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3}, 0x48) 17:20:59 executing program 0: socketpair(0xa, 0x3, 0x8, &(0x7f0000000180)) 17:20:59 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x1c, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 17:20:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x80) 17:20:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xcd) 17:20:59 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000006d3700000000000001f8ffff18170000", @ANYRES32, @ANYBLOB="0000000000000000185700000d0000001d00000000000000183700000500000000090000000000001f362000040000000159020040000000003f04000600000095"], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 17:20:59 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 17:20:59 executing program 2: syz_clone(0x200000, &(0x7f0000001340), 0x0, 0x0, &(0x7f0000000140), 0x0) 17:20:59 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000580)='GPL\x00', 0x1, 0xf3, &(0x7f00000005c0)=""/243, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x7, &(0x7f0000000000)=@framed={{}, [@initr0, @cb_func]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=@base={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 17:20:59 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x6, &(0x7f00000002c0)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0xfff, 0x20, &(0x7f0000000180)=""/32, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, 0x48) 17:20:59 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf}, 0x48) 17:20:59 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 17:20:59 executing program 4: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000b80)) 17:20:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x0, 0x2, &(0x7f0000000800)=@raw=[@cb_func], &(0x7f0000000840)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x200000}, 0x80) 17:20:59 executing program 2: socketpair(0x25, 0x0, 0x0, &(0x7f0000002100)) 17:20:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002ac0)=[{0x98, 0x0, 0x0, "3fd473196669cbef44c6b86bd59173d92c45f9eabb7346a56b2f2b10956aa258e13734393480978c6275cb6da7d846fd07d6d22ebe1fdca7d12e16f72d93ee47419621fcfa9d6cb0f82d5abc3a1113cd6820ae17a6de895022ec468257e22757f0de29408cf94dced2503cc287b93a6c3f76d69c099f4eb68ac9dff737e94c8ee7"}, {0x50, 0x0, 0x0, "56917715a4ccab7f5dc46c28aa87e97072c2a765762b869addb73fdc5d2402d2757b9284fd16bd3b33e3cafedd43375d4fad2d84133cd8a002"}], 0xe8}, 0x0) 17:20:59 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 17:20:59 executing program 1: socketpair(0x1c, 0x3, 0xfb, &(0x7f0000000040)) 17:20:59 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000002d80)={0x0, 0x0, 0x0}, 0x0) 17:20:59 executing program 0: sendmsg(0xffffffffffffff9c, &(0x7f0000002600)={&(0x7f0000000080)=@un=@file={0x3}, 0x3, 0x0}, 0x0) 17:20:59 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002ac0)=[{0x98, 0x0, 0x0, "3fd473196669cbef44c6b86bd59173d92c45f9eabb7346a56b2f2b10956aa258e13734393480978c6275cb6da7d846fd07d6d22ebe1fdca7d12e16f72d93ee47419621fcfa9d6cb0f82d5abc3a1113cd6820ae17a6de895022ec468257e22757f0de29408cf94dced2503cc287b93a6c3f76d69c099f4eb68ac9dff737e94c8ee7"}, {0x10}], 0xa8}, 0x0) 17:20:59 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x8b, &(0x7f0000000140)=""/139, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x23) 17:20:59 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x1200, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240), 0x10}, 0x80) 17:20:59 executing program 3: socketpair(0x23, 0x0, 0x4a3, &(0x7f00000000c0)) 17:20:59 executing program 1: socketpair(0x1e, 0x0, 0x17, &(0x7f0000000000)) 17:20:59 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x1a, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:20:59 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x5, &(0x7f0000000240)=@framed={{}, [@map_fd]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x1, &(0x7f0000000080)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0xf4240, &(0x7f0000000040)=@framed={{}, [@call]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xc003, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x1b, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 0: bpf$PROG_LOAD_XDP(0x11, &(0x7f00000002c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x1, &(0x7f0000000000)=@raw=[@exit], &(0x7f0000000040)='GPL\x00', 0x6, 0xb7, &(0x7f0000000140)=""/183, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x4, 0x4, 0x12}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r0, &(0x7f0000000080)}, 0x20) 17:21:00 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000007974f9ad000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7}]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 4: socketpair(0x22, 0x0, 0x1, &(0x7f0000000540)) 17:21:00 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000002d40)='ns/time_for_children\x00') 17:21:00 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xf4240, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 0: bpf$PROG_LOAD_XDP(0x13, 0x0, 0x0) 17:21:00 executing program 2: bpf$PROG_LOAD_XDP(0xc, 0x0, 0x0) 17:21:00 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x7, &(0x7f00000000c0)=@framed={{}, [@alu, @generic, @btf_id]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@const, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}]}}, &(0x7f0000000500)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 17:21:00 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000001a40)='ns/pid_for_children\x00') 17:21:00 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x100000, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 3: bpf$PROG_LOAD_XDP(0x22, &(0x7f00000002c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:00 executing program 4: socketpair(0x1, 0x0, 0x4, &(0x7f0000000000)) 17:21:00 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001a40)='ns/user\x00') 17:21:00 executing program 2: socketpair(0x3, 0x0, 0xf8bf000, &(0x7f0000000040)) 17:21:00 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x0, 0x0, 0x2}]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000001bc0)='ns/cgroup\x00') 17:21:02 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 0: bpf$PROG_LOAD_XDP(0x1a, 0x0, 0x0) 17:21:02 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000040)=@framed={{}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0xc7, &(0x7f0000000340)=""/199, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x1, 0x4}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xc003, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000000)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x10, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x5}, [@initr0]}, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x9, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x12, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x3e9, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x0, 0x0, 0x5}]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 2: socketpair(0x9, 0x0, 0x0, &(0x7f0000002b40)) 17:21:02 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002fc0)='ns/mnt\x00') 17:21:02 executing program 3: socketpair(0x27, 0x0, 0x0, &(0x7f0000000180)) 17:21:02 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={0x0, 0x0, 0x8}, 0x10) 17:21:02 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xff00}, 0x80) 17:21:02 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 17:21:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x8003, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 1: bpf$PROG_LOAD_XDP(0x8, &(0x7f00000002c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x1e, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001380)={0x18, 0x1, &(0x7f0000000040)=@raw=[@ldst={0x2}], &(0x7f00000000c0)='GPL\x00', 0x4, 0xc1, &(0x7f0000001200)=""/193, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 1: socketpair(0x1d, 0x1, 0x5, &(0x7f0000000000)) 17:21:02 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9}, 0x48) 17:21:02 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x123) 17:21:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x9, 0x111}, 0x48) 17:21:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000006c0)={&(0x7f0000000100)={0x2, 0x0, @private}, 0x10, 0x0}, 0x0) 17:21:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8, 0x0, 0x4}, 0x48) 17:21:02 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xff03, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x14}, 0x48) 17:21:02 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=0x1, 0xffffffffffffffff, 0x10}, 0x10) 17:21:02 executing program 3: bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x9, &(0x7f0000000100)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0)='FREEZING\x00', 0x9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x101000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'pim6reg\x00', 0x532}) 17:21:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x0, 0x0, 0x0, 0x401}, 0x48) 17:21:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5}, 0x48) [ 628.069584][ T8081] can: request_module (can-proto-5) failed. 17:21:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x8}, 0x48) 17:21:02 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xf, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) 17:21:02 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000028c0)=@bloom_filter={0x1e, 0x0, 0x1}, 0x48) 17:21:02 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xe, 0x0, 0x0, 0x2}, 0x48) 17:21:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x825}, 0x48) 17:21:03 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000380)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x10}]}, &(0x7f00000003c0)='syzkaller\x00', 0x4, 0xfb, &(0x7f0000000400)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 3: bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map, 0xffffffffffffffff, 0xc}, 0x14) 17:21:03 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x70}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0xb, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x3}]}, @union={0xa}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/200, 0x43, 0xc8, 0x1}, 0x20) 17:21:03 executing program 4: bpf$PROG_LOAD(0x1e, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 1: syz_clone(0x3100000, &(0x7f0000000000)="10", 0x1, &(0x7f0000000080), 0x0, 0x0) 17:21:03 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='freezer.state\x00', 0x0, 0x0) 17:21:03 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000340)='f', &(0x7f0000000440)}, 0x48) 17:21:03 executing program 5: bpf$PROG_LOAD(0x1c, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000028c0)=@bloom_filter={0x1e, 0x0, 0x1, 0x80, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0, 0xb}, 0x48) 17:21:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x7}, 0x48) 17:21:03 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340), 0x0}, 0x48) 17:21:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x68}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 0: bpf$PROG_LOAD(0x1d, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x5, 0x8, 0x3ffdcf, 0x80000000}, 0x48) 17:21:03 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x3, &(0x7f00000001c0)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000028c0)=@bloom_filter={0x1e, 0x0, 0x1, 0x80, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xb}, 0x48) 17:21:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000028c0)=@bloom_filter={0x1e, 0x0, 0x1, 0x80}, 0x48) 17:21:03 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x10}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000740)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x1, 0xd2, &(0x7f0000000140)=""/210, 0x0, 0x3, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 4: bpf$PROG_LOAD(0x23, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7100}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0x48) 17:21:03 executing program 4: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x4}, 0x10) 17:21:03 executing program 2: bpf$PROG_LOAD(0x11, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 3: socketpair(0x10, 0x3, 0xff, &(0x7f00000000c0)) 17:21:03 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x48}}, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x5, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x2, 0x200, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 17:21:03 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 17:21:03 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='syzkaller\x00', 0x3, 0xef, &(0x7f0000000200)=""/239, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:03 executing program 1: bpf$PROG_LOAD(0x21, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0xf}, 0x48) 17:21:03 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 17:21:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x1, 0x0, 0x200}, 0x48) 17:21:03 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x400000, 0x200}, 0x48) 17:21:03 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x4, 0x0, 0x1}, 0x48) 17:21:03 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x17, 0x0, 0x101, 0x200, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 17:21:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x204, 0xffffffffffffffff, 0x7fff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 17:21:03 executing program 0: bpf$MAP_CREATE(0x1b, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 17:21:03 executing program 4: bpf$MAP_CREATE(0x9, &(0x7f0000000240), 0x48) 17:21:03 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)) 17:21:03 executing program 1: bpf$MAP_CREATE(0xa, &(0x7f0000000240), 0x48) 17:21:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x2, 0x200, 0x8}, 0x48) 17:21:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x3}, 0x48) 17:21:04 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 17:21:04 executing program 4: bpf$MAP_CREATE(0xf, &(0x7f0000000240), 0x48) 17:21:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1b, 0x0, 0x0, 0x200}, 0x48) 17:21:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0xa5) 17:21:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x7}, 0x48) 17:21:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x17, 0x0, 0x101, 0x200}, 0x48) 17:21:06 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'erspan0\x00', 0x1}) 17:21:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x16, 0x0, 0x2, 0x200, 0x10}, 0x48) 17:21:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9}, 0x8) 17:21:06 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0xfffffffffffffffe, 0x0) 17:21:06 executing program 2: bpf$MAP_CREATE(0x1a, 0x0, 0x0) 17:21:06 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0x0, 0x0, 0x0, 0xf06}, 0x48) 17:21:06 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000000240), 0x48) 17:21:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x10, &(0x7f0000000480)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x60, &(0x7f0000000500)=""/96, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 5: bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000500), 0x10) 17:21:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x13, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x9, &(0x7f0000000100)=@raw=[@call={0x85, 0x0, 0x0, 0x76}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6c47}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}], &(0x7f0000000180)='GPL\x00', 0x30, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001200), 0x8, 0x10, 0x0}, 0x80) 17:21:06 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x5, 0x1, &(0x7f0000000480)=@raw=[@jmp], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x285, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x48) 17:21:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x6, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x92, &(0x7f0000000280)=""/146, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 2: bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300), 0x10) 17:21:06 executing program 4: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000380)) 17:21:06 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_val], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x10, &(0x7f0000000480)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0xfff, 0x400, 0x0, 0x1}, 0x48) 17:21:06 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x6, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x101, 0x92, &(0x7f0000000280)=""/146, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 4: socketpair(0x2c, 0x3, 0x0, &(0x7f0000000380)) 17:21:06 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x9, &(0x7f0000000100)=@raw=[@call, @map_val, @map_idx_val, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @btf_id], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x2, &(0x7f0000000080)=@raw=[@initr0], &(0x7f00000000c0)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1904, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 17:21:06 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)) 17:21:06 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{}, [@jmp, @func]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x10, &(0x7f0000000480)=ANY=[@ANYRES32], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x2, &(0x7f0000000080)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x1000}], &(0x7f00000000c0)='GPL\x00', 0xfffffff7, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xd, 0xffff}, 0x10}, 0x80) 17:21:06 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0xfff, 0x400, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 17:21:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) 17:21:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x48) 17:21:06 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x5, &(0x7f0000000100)=@raw=[@call, @map_val, @map_idx_val], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xff03, &(0x7f0000000080)=@framed={{}, [@alu]}, &(0x7f0000000100)='syzkaller\x00', 0x2, 0x99, &(0x7f0000000140)=""/153, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:06 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4100, 0x0) 17:21:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x2, &(0x7f0000000100)=@raw=[@map_idx_val], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x10, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x8, &(0x7f0000000100)=@raw=[@call, @map_val, @map_idx_val, @btf_id, @exit], &(0x7f0000000180)='GPL\x00', 0x30, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00000000c0)) 17:21:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, 0x0}, 0x80) 17:21:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0xfff, 0x400, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5}, 0x48) 17:21:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x1, &(0x7f0000000100)=@raw=[@call], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0xa, &(0x7f0000000100)=@raw=[@call={0x85, 0x0, 0x0, 0x76}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6c47}, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @btf_id, @exit], &(0x7f0000000180)='GPL\x00', 0x30, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000001240)={0x4}, 0x10}, 0x80) 17:21:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 17:21:07 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x4, &(0x7f0000000100)=@raw=[@map_val, @map_idx_val], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x101040, 0x0) 17:21:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000040)=@framed={{}, [@jmp, @btf_id, @generic, @func, @map_idx_val, @btf_id]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x7, &(0x7f0000000100)=@raw=[@call, @map_val, @map_idx_val, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000180)='GPL\x00', 0x30, 0x0, 0x0, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000001240)={0x4}, 0x10}, 0x80) 17:21:07 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x10, &(0x7f0000000480)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0xa, &(0x7f0000000100)=@raw=[@call={0x85, 0x0, 0x0, 0x76}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x6c47}, @map_fd={0x18, 0x6, 0x1, 0x0, 0x1}, @btf_id, @exit], &(0x7f0000000180)='GPL\x00', 0x30, 0x1000, &(0x7f00000001c0)=""/4096, 0x41100, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001200)={0x1}, 0x8, 0x10, 0x0}, 0x80) 17:21:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140), 0x10}, 0x80) 17:21:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 17:21:07 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 17:21:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1904, 0x1}, 0x48) 17:21:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 17:21:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7}, 0x48) 17:21:07 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x1, &(0x7f0000000100)=@raw=[@call], &(0x7f0000000180)='GPL\x00', 0x0, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x0, 0x0, 0x0, 0x40a, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) 17:21:07 executing program 4: syz_clone(0x41940080, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:21:07 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1e, 0x0, 0x4, 0x100001, 0x8, 0x1}, 0x48) 17:21:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x2, &(0x7f0000000000)=@raw=[@map_idx_val], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:07 executing program 5: syz_clone(0x12820000, 0x0, 0x0, 0x0, 0x0, 0x0) 17:21:07 executing program 1: socketpair(0x23, 0x0, 0x2, &(0x7f0000000380)) 17:21:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xb, 0x10, 0x0, &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 17:21:07 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:21:07 executing program 3: openat$ppp(0xffffffffffffff9c, 0x0, 0x561000, 0x0) 17:21:07 executing program 0: socketpair(0x10, 0x2, 0xfb8, &(0x7f0000000240)) 17:21:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x0, 0x0, 0x0, 0x1904, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 17:21:07 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x12, 0x1, &(0x7f0000000680)=@raw=[@alu], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 3: socketpair(0x1, 0x3, 0x5, 0x0) 17:21:07 executing program 4: syz_clone(0x41940080, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:21:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x1, &(0x7f0000000100)=@raw=[@call], &(0x7f0000000180)='GPL\x00', 0x30, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000600)) 17:21:07 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x6, 0x7, &(0x7f0000000100)=@raw=[@call, @map_val, @map_idx_val, @map_fd={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000180)='GPL\x00', 0x30, 0x1000, &(0x7f00000001c0)=""/4096, 0x0, 0x14, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001200), 0x8, 0x10, 0x0}, 0x80) 17:21:07 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/time\x00') 17:21:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={&(0x7f0000001900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2}}, @fwd={0x0, 0x0, 0x0, 0xa}]}}, &(0x7f0000001940)=""/162, 0x3e, 0xa2, 0x1}, 0x20) 17:21:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x0, 0x1c8c}, 0x48) 17:21:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:07 executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000080)={r0}, 0xc) 17:21:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b, 0x0, 0x0, 0x2}, 0x48) 17:21:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@enum, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff46, [{0x2, 0x1, 0x400}]}]}, {0x0, [0x0, 0x47]}}, &(0x7f0000000cc0)=""/4096, 0x40, 0x1000, 0x1}, 0x20) 17:21:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x0, 0x0, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@enum, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff46, [{0x2, 0x1, 0x400}]}]}, {0x0, [0x0, 0x47]}}, &(0x7f0000000cc0)=""/4096, 0x40, 0x1000, 0x1}, 0x20) 17:21:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0xa}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0xe, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x3c01}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1e, 0x0, 0x4, 0x100001, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000af80)={r0, 0x0, 0x0}, 0x10) 17:21:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@enum, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff46, [{0x2, 0x1, 0x400}]}]}, {0x0, [0x0, 0x47]}}, &(0x7f0000000cc0)=""/4096, 0x40, 0x1000, 0x1}, 0x20) 17:21:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter, 0x48) 17:21:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1}]}]}}, &(0x7f0000000440)=""/133, 0x32, 0x85, 0x1}, 0x20) 17:21:08 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1d, 0x0, 0x0, 0x0, 0x1}, 0x48) 17:21:08 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 17:21:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000cc0)=""/4096, 0x33, 0x1000, 0x1}, 0x20) 17:21:08 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000000400), 0x48) 17:21:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x17}, 0x48) 17:21:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@enum, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff46, [{0x2, 0x1, 0x400}]}]}, {0x0, [0x0, 0x47]}}, &(0x7f0000000cc0)=""/4096, 0x40, 0x1000, 0x1}, 0x20) 17:21:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xa0) 17:21:08 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x0, 0x4c, 0x0, 0x6}]}}, &(0x7f0000000340)=""/194, 0x26, 0xc2, 0x1}, 0x20) 17:21:08 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000186b000002000000000000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x87, &(0x7f0000000280)=""/135, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x100000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x16, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 0: bpf$MAP_CREATE(0x10, &(0x7f0000000400), 0x48) 17:21:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x5}]}]}}, &(0x7f0000000c40)=""/195, 0x32, 0xc3, 0x1}, 0x20) 17:21:08 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000019c0)={0xffffffffffffffff}, 0x4) 17:21:08 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x100000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x9, 0x3, &(0x7f0000000380)=@framed, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a00)={&(0x7f0000001900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x0, {0x0, 0x1000000}}]}}, &(0x7f0000001940)=""/162, 0x32, 0xa2, 0x1}, 0x20) 17:21:08 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000740)=@base={0x9}, 0x48) 17:21:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x0, 0x0, 0x0, 0x2}, 0x48) 17:21:08 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x100000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 1: bpf$MAP_CREATE(0x14, &(0x7f0000000400), 0x48) 17:21:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@kfunc={0x85, 0x0, 0x4, 0x8510}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 5: bpf$MAP_CREATE(0xf, &(0x7f0000000400), 0x48) 17:21:08 executing program 3: bpf$MAP_CREATE(0x11, &(0x7f0000000400), 0x48) 17:21:08 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x1, 0x5, 0xc10}, 0x48) 17:21:08 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0x100000}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0xc001, &(0x7f0000000000)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:08 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x3, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_ext={0x15, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1ca14, r0}, 0x80) 17:21:08 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x3, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 17:21:09 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 17:21:09 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x1, &(0x7f0000000000)=@raw=[@jmp], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@enum, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0xffffff46, [{0x0, 0x1}]}]}}, &(0x7f0000000cc0)=""/4096, 0x3e, 0x1000, 0x1}, 0x20) 17:21:09 executing program 5: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000400000000000000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_ext={0x1c, 0x9, &(0x7f0000000080)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}, @func, @map_idx, @cb_func, @map_idx_val, @kfunc], &(0x7f0000000100)='GPL\x00', 0x4, 0xb3, &(0x7f0000000200)=""/179, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x80) 17:21:09 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x2, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x7, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 17:21:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000c40)=""/195, 0x1a, 0xc3, 0x1}, 0x20) [ 634.416190][ T8485] ------------[ cut here ]------------ [ 634.416200][ T8485] WARNING: CPU: 1 PID: 8485 at include/linux/skbuff.h:2911 ipgre_xmit+0x894/0x970 [ 634.431311][ T8485] Modules linked in: [ 634.435246][ T8485] CPU: 1 PID: 8485 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-12183-g08c79c9cd67f #0 [ 634.445440][ T8485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.455591][ T8485] RIP: 0010:ipgre_xmit+0x894/0x970 17:21:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 634.460858][ T8485] Code: 89 14 24 e8 ae 2a d1 f9 48 8b 14 24 e9 be f9 ff ff e8 c0 2a d1 f9 e9 02 fa ff ff e8 a6 2a d1 f9 e9 55 fa ff ff e8 9c 33 84 f9 <0f> 0b e9 66 fa ff ff 48 8b 7c 24 08 e8 ab 2a d1 f9 e9 03 f8 ff ff [ 634.480618][ T8485] RSP: 0018:ffffc9000480f4b8 EFLAGS: 00010202 [ 634.486729][ T8485] RAX: 0000000000000280 RBX: 000000000000ffff RCX: ffffc90003221000 [ 634.494836][ T8485] RDX: 0000000000040000 RSI: ffffffff87f650b4 RDI: 0000000000000003 [ 634.502953][ T8485] RBP: ffff88802b4fdc80 R08: 0000000000000003 R09: 000000000000ffff 17:21:09 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x15}, 0x48) 17:21:09 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x6, 0xc001, &(0x7f0000000000)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x94, &(0x7f00000000c0)=""/148, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 634.511098][ T8485] R10: 000000000000ffff R11: 0000000000000001 R12: ffff88807c120000 [ 634.519212][ T8485] R13: ffff88802b4fdd34 R14: 0000000000000004 R15: ffff888076858000 [ 634.527239][ T8485] FS: 00007f61a9e68700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 634.536329][ T8485] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 634.543033][ T8485] CR2: 00007f61a8d9d090 CR3: 000000007b63e000 CR4: 00000000003506e0 [ 634.551229][ T8485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 634.559324][ T8485] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 634.567338][ T8485] Call Trace: [ 634.570735][ T8485] [ 634.573716][ T8485] dev_hard_start_xmit+0x188/0x880 [ 634.579043][ T8485] __dev_queue_xmit+0x2b1d/0x3900 [ 634.584310][ T8485] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 634.589737][ T8485] ? skb_release_data+0x12f/0x810 [ 634.594812][ T8485] ? skb_headers_offset_update+0x125/0x250 [ 634.600786][ T8485] ? pskb_expand_head+0x55d/0x1070 [ 634.605958][ T8485] __bpf_redirect+0x5fe/0xe40 [ 634.610832][ T8485] ? skb_ensure_writable+0xdc/0x450 17:21:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000c40)=""/195, 0x35, 0xc3, 0x1}, 0x20) [ 634.616229][ T8485] bpf_clone_redirect+0x2ae/0x420 [ 634.621403][ T8485] bpf_prog_973cd02a7a0e8181+0x56/0x5b [ 634.626923][ T8485] ? find_held_lock+0x2d/0x110 [ 634.631832][ T8485] ? bpf_test_timer_enter+0xa0/0x160 [ 634.637226][ T8485] ? lock_downgrade+0x6e0/0x6e0 [ 634.642232][ T8485] ? ktime_get+0x38a/0x470 [ 634.646777][ T8485] ? ktime_get+0x38a/0x470 [ 634.651349][ T8485] ? lockdep_hardirqs_on+0x79/0x100 [ 634.656605][ T8485] ? ktime_get+0x38a/0x470 [ 634.661167][ T8485] ? ktime_get+0x30b/0x470 17:21:09 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x5, 0xb2, 0x4, 0x9}, 0x48) 17:21:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000000)=@framed={{0x61}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 634.665637][ T8485] ? bpf_test_timer_enter+0xa0/0x160 [ 634.671068][ T8485] bpf_test_run+0x386/0x9d0 [ 634.675631][ T8485] ? bpf_test_timer_continue+0x420/0x420 [ 634.681399][ T8485] ? __phys_addr+0xc4/0x140 [ 634.685967][ T8485] ? memset+0x20/0x40 [ 634.690079][ T8485] ? eth_type_trans+0x2a8/0x640 [ 634.695062][ T8485] ? __build_skb+0x50/0x60 [ 634.699573][ T8485] bpf_prog_test_run_skb+0xb5e/0x1e10 [ 634.705125][ T8485] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 634.710989][ T8485] ? fput+0x2a/0x50 [ 634.714845][ T8485] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 634.720712][ T8485] __sys_bpf+0x15c1/0x5700 [ 634.725294][ T8485] ? bpf_perf_link_attach+0x520/0x520 [ 634.730909][ T8485] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 634.736953][ T8485] ? find_held_lock+0x2d/0x110 [ 634.741895][ T8485] __x64_sys_bpf+0x75/0xb0 [ 634.746354][ T8485] ? syscall_enter_from_user_mode+0x21/0x70 [ 634.752406][ T8485] do_syscall_64+0x35/0xb0 [ 634.756875][ T8485] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 634.762894][ T8485] RIP: 0033:0x7f61a8c89109 [ 634.767373][ T8485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 634.787554][ T8485] RSP: 002b:00007f61a9e68168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 634.796191][ T8485] RAX: ffffffffffffffda RBX: 00007f61a8d9bf60 RCX: 00007f61a8c89109 [ 634.804300][ T8485] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 634.812408][ T8485] RBP: 00007f61a8ce305d R08: 0000000000000000 R09: 0000000000000000 [ 634.820553][ T8485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 634.829011][ T8485] R13: 00007ffd6a23210f R14: 00007f61a9e68300 R15: 0000000000022000 [ 634.837054][ T8485] [ 634.840213][ T8485] Kernel panic - not syncing: panic_on_warn set ... [ 634.846952][ T8485] CPU: 1 PID: 8485 Comm: syz-executor.3 Not tainted 5.18.0-syzkaller-12183-g08c79c9cd67f #0 [ 634.857059][ T8485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.867152][ T8485] Call Trace: [ 634.870447][ T8485] [ 634.873385][ T8485] dump_stack_lvl+0xcd/0x134 [ 634.878010][ T8485] panic+0x2d7/0x636 [ 634.881953][ T8485] ? panic_print_sys_info.part.0+0x10b/0x10b [ 634.887960][ T8485] ? __warn.cold+0x1d9/0x2cd [ 634.892608][ T8485] ? ipgre_xmit+0x894/0x970 [ 634.897327][ T8485] __warn.cold+0x1ea/0x2cd [ 634.901802][ T8485] ? ipgre_xmit+0x894/0x970 [ 634.906353][ T8485] report_bug+0x1bc/0x210 [ 634.910822][ T8485] handle_bug+0x3c/0x60 [ 634.915000][ T8485] exc_invalid_op+0x14/0x40 [ 634.919531][ T8485] asm_exc_invalid_op+0x1b/0x20 [ 634.924396][ T8485] RIP: 0010:ipgre_xmit+0x894/0x970 [ 634.929522][ T8485] Code: 89 14 24 e8 ae 2a d1 f9 48 8b 14 24 e9 be f9 ff ff e8 c0 2a d1 f9 e9 02 fa ff ff e8 a6 2a d1 f9 e9 55 fa ff ff e8 9c 33 84 f9 <0f> 0b e9 66 fa ff ff 48 8b 7c 24 08 e8 ab 2a d1 f9 e9 03 f8 ff ff [ 634.949232][ T8485] RSP: 0018:ffffc9000480f4b8 EFLAGS: 00010202 [ 634.955312][ T8485] RAX: 0000000000000280 RBX: 000000000000ffff RCX: ffffc90003221000 [ 634.963296][ T8485] RDX: 0000000000040000 RSI: ffffffff87f650b4 RDI: 0000000000000003 [ 634.971556][ T8485] RBP: ffff88802b4fdc80 R08: 0000000000000003 R09: 000000000000ffff [ 634.979573][ T8485] R10: 000000000000ffff R11: 0000000000000001 R12: ffff88807c120000 [ 634.987561][ T8485] R13: ffff88802b4fdd34 R14: 0000000000000004 R15: ffff888076858000 [ 634.995587][ T8485] ? ipgre_xmit+0x894/0x970 [ 635.000119][ T8485] ? ipgre_xmit+0x894/0x970 [ 635.004643][ T8485] dev_hard_start_xmit+0x188/0x880 [ 635.009879][ T8485] __dev_queue_xmit+0x2b1d/0x3900 [ 635.014926][ T8485] ? netdev_core_pick_tx+0x2e0/0x2e0 [ 635.020239][ T8485] ? skb_release_data+0x12f/0x810 [ 635.025296][ T8485] ? skb_headers_offset_update+0x125/0x250 [ 635.031123][ T8485] ? pskb_expand_head+0x55d/0x1070 [ 635.036253][ T8485] __bpf_redirect+0x5fe/0xe40 [ 635.040947][ T8485] ? skb_ensure_writable+0xdc/0x450 [ 635.046158][ T8485] bpf_clone_redirect+0x2ae/0x420 [ 635.051217][ T8485] bpf_prog_973cd02a7a0e8181+0x56/0x5b [ 635.056698][ T8485] ? find_held_lock+0x2d/0x110 [ 635.061505][ T8485] ? bpf_test_timer_enter+0xa0/0x160 [ 635.066808][ T8485] ? lock_downgrade+0x6e0/0x6e0 [ 635.071680][ T8485] ? ktime_get+0x38a/0x470 [ 635.076112][ T8485] ? ktime_get+0x38a/0x470 [ 635.080550][ T8485] ? lockdep_hardirqs_on+0x79/0x100 [ 635.085965][ T8485] ? ktime_get+0x38a/0x470 [ 635.090392][ T8485] ? ktime_get+0x30b/0x470 [ 635.094852][ T8485] ? bpf_test_timer_enter+0xa0/0x160 [ 635.100151][ T8485] bpf_test_run+0x386/0x9d0 [ 635.104699][ T8485] ? bpf_test_timer_continue+0x420/0x420 [ 635.110348][ T8485] ? __phys_addr+0xc4/0x140 [ 635.114890][ T8485] ? memset+0x20/0x40 [ 635.118886][ T8485] ? eth_type_trans+0x2a8/0x640 [ 635.123750][ T8485] ? __build_skb+0x50/0x60 [ 635.128188][ T8485] bpf_prog_test_run_skb+0xb5e/0x1e10 [ 635.133584][ T8485] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 635.139325][ T8485] ? fput+0x2a/0x50 [ 635.143145][ T8485] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 635.148880][ T8485] __sys_bpf+0x15c1/0x5700 [ 635.153318][ T8485] ? bpf_perf_link_attach+0x520/0x520 [ 635.158708][ T8485] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 635.164729][ T8485] ? find_held_lock+0x2d/0x110 [ 635.169543][ T8485] __x64_sys_bpf+0x75/0xb0 [ 635.173971][ T8485] ? syscall_enter_from_user_mode+0x21/0x70 [ 635.179878][ T8485] do_syscall_64+0x35/0xb0 [ 635.184329][ T8485] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 635.190272][ T8485] RIP: 0033:0x7f61a8c89109 [ 635.194815][ T8485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 635.214471][ T8485] RSP: 002b:00007f61a9e68168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.223004][ T8485] RAX: ffffffffffffffda RBX: 00007f61a8d9bf60 RCX: 00007f61a8c89109 [ 635.231071][ T8485] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 635.239049][ T8485] RBP: 00007f61a8ce305d R08: 0000000000000000 R09: 0000000000000000 [ 635.247053][ T8485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 635.255137][ T8485] R13: 00007ffd6a23210f R14: 00007f61a9e68300 R15: 0000000000022000 [ 635.263155][ T8485] [ 635.266556][ T8485] Kernel Offset: disabled [ 635.270951][ T8485] Rebooting in 86400 seconds..