x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX], 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 11:20:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8000, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc602f0000000a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 11:20:22 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x1, 0x0, 0x3f000000}, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 11:20:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x508, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) write$cgroup_type(r3, &(0x7f0000000180), 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_journal_start\x00'}, 0x10) 11:20:22 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x508, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) write$cgroup_type(r3, &(0x7f0000000180), 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_journal_start\x00'}, 0x10) 11:20:22 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 765.308552][T14175] netlink: 116376 bytes leftover after parsing attributes in process `syz-executor.1'. 11:20:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x508, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) write$cgroup_type(r3, &(0x7f0000000180), 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_journal_start\x00'}, 0x10) 11:20:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x508, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) write$cgroup_type(r3, &(0x7f0000000180), 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_journal_start\x00'}, 0x10) 11:20:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x39}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:23 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYRES16, @ANYRES32], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f0000000400)=0x400000004) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000300), 0x12) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_devices(r3, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRESHEX], 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 11:20:23 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x5, 0x97, &(0x7f00000006c0)=""/151, 0xc2f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001c00)={0x3, 0x9, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52}, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='consume_skb\x00', r0}, 0x10) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r2, 0x8, &(0x7f0000000e00)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xf, 0xb9, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000e80)=[r2, 0x1, r2, 0xffffffffffffffff, r2, r2, 0x1, 0xffffffffffffffff]}, 0x80) syz_clone(0xc0800400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000480)='prq_report\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 11:20:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:23 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x508, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) write$cgroup_type(r3, &(0x7f0000000180), 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_journal_start\x00'}, 0x10) 11:20:23 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f0000000500)={0x0, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x508, 0x0, 0x2, 0x0, 0x0, 0xfffffffd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x6) write$cgroup_type(r3, &(0x7f0000000180), 0xfdef) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='ext4_journal_start\x00'}, 0x10) 11:20:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x6, 0x0, @mcast2, 0x1a}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4800}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 11:20:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x6, 0x0, @mcast2, 0x1a}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4800}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 11:20:24 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001440)=[@ip_tos_u8={{0x11, 0x0, 0x3}}], 0x18}, 0x0) 11:20:24 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x41c46, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0, 0xb}, 0x8000, 0xfffffffffffffc00, 0x0, 0x0, 0xfbeced8, 0x3d09, 0x0, 0x0, 0xffffffff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) bpf$ENABLE_STATS(0x20, &(0x7f0000000100), 0x4) 11:20:24 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001440)=[@ip_tos_u8={{0x11, 0x0, 0x3}}], 0x18}, 0x0) 11:20:24 executing program 5: syz_clone(0x40180000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') 11:20:24 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001440)=[@ip_tos_u8={{0x11, 0x0, 0x3}}], 0x18}, 0x0) 11:20:24 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x6, 0x0, @mcast2, 0x1a}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4800}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 11:20:25 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x5, 0x97, &(0x7f00000006c0)=""/151, 0xc2f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001c00)={0x3, 0x9, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52}, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='consume_skb\x00', r0}, 0x10) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r2, 0x8, &(0x7f0000000e00)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xf, 0xb9, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000e80)=[r2, 0x1, r2, 0xffffffffffffffff, r2, r2, 0x1, 0xffffffffffffffff]}, 0x80) syz_clone(0xc0800400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000480)='prq_report\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 11:20:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x41c46, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0, 0xb}, 0x8000, 0xfffffffffffffc00, 0x0, 0x0, 0xfbeced8, 0x3d09, 0x0, 0x0, 0xffffffff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) bpf$ENABLE_STATS(0x20, &(0x7f0000000100), 0x4) 11:20:25 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000001500)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0, 0x0, &(0x7f0000001440)=[@ip_tos_u8={{0x11, 0x0, 0x3}}], 0x18}, 0x0) 11:20:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:25 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x6, 0x0, @mcast2, 0x1a}, 0xbad3, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x0, 0x4800}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x3, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) 11:20:25 executing program 5: syz_clone(0x40180000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') 11:20:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x41c46, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0, 0xb}, 0x8000, 0xfffffffffffffc00, 0x0, 0x0, 0xfbeced8, 0x3d09, 0x0, 0x0, 0xffffffff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) bpf$ENABLE_STATS(0x20, &(0x7f0000000100), 0x4) 11:20:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:25 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x41c46, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x1, @perf_bp={0x0, 0xb}, 0x8000, 0xfffffffffffffc00, 0x0, 0x0, 0xfbeced8, 0x3d09, 0x0, 0x0, 0xffffffff, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f0000000000)=0x8000) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) bpf$ENABLE_STATS(0x20, &(0x7f0000000100), 0x4) 11:20:26 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:26 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:30 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x5, 0x97, &(0x7f00000006c0)=""/151, 0xc2f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001c00)={0x3, 0x9, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52}, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='consume_skb\x00', r0}, 0x10) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r2, 0x8, &(0x7f0000000e00)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xf, 0xb9, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000e80)=[r2, 0x1, r2, 0xffffffffffffffff, r2, r2, 0x1, 0xffffffffffffffff]}, 0x80) syz_clone(0xc0800400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000480)='prq_report\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 11:20:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:30 executing program 5: syz_clone(0x40180000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') 11:20:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:30 executing program 5: syz_clone(0x40180000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') 11:20:31 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r4, 0x2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r4, &(0x7f00000003c0)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0xc028660f, &(0x7f00000005c0)=0x400000000) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086607, &(0x7f0000000040)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x6611, 0x0) 11:20:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b4637eaa1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab9912b2b9c326f8af55453d720910c22f25693e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e812b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23812645114f7b3b9d4213c17a342973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc084fe8f722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc86, 0x1a, &(0x7f0000000040)="08b04a9b42c4939980741c3dc7fc17d8276a194d93249b29a289a4009822130c0600a98fc018cf8070d1a27dce1241974f2e875ffeba15", &(0x7f00000005c0)="658b432bc799f2038d2d2b3887fcb504e455f80a6baa35db00b8c0b1cc483cb73f853d23033fff4172051584a5ee8f7c42cc5222606bd49521f55dd274dae6976e4c53427aedebb3c693f4eca060dc5cdd776dabff84b77639d121dc366177a67dff61064d35db95928b000000000000378828f9b3fe19d11e24b85234c74518050ce30fc317f27d7f4a2ca50c35686bec066493c0800e3b806c3d3793992602d009244c828947b322b3e9fb28b5b17c9dcb8e83ba"}, 0x28) 11:20:36 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b4637eaa1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab9912b2b9c326f8af55453d720910c22f25693e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e812b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23812645114f7b3b9d4213c17a342973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc084fe8f722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc86, 0x1a, &(0x7f0000000040)="08b04a9b42c4939980741c3dc7fc17d8276a194d93249b29a289a4009822130c0600a98fc018cf8070d1a27dce1241974f2e875ffeba15", &(0x7f00000005c0)="658b432bc799f2038d2d2b3887fcb504e455f80a6baa35db00b8c0b1cc483cb73f853d23033fff4172051584a5ee8f7c42cc5222606bd49521f55dd274dae6976e4c53427aedebb3c693f4eca060dc5cdd776dabff84b77639d121dc366177a67dff61064d35db95928b000000000000378828f9b3fe19d11e24b85234c74518050ce30fc317f27d7f4a2ca50c35686bec066493c0800e3b806c3d3793992602d009244c828947b322b3e9fb28b5b17c9dcb8e83ba"}, 0x28) 11:20:36 executing program 4: bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c80)={0x0, 0xd, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0, 0x5, 0x97, &(0x7f00000006c0)=""/151, 0xc2f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001bc0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001c00)={0x3, 0x9, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000001c40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x52}, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='consume_skb\x00', r0}, 0x10) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0xb, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x1, r2, 0x8, &(0x7f0000000e00)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000e40)={0x0, 0xf, 0xb9, 0x200}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000e80)=[r2, 0x1, r2, 0xffffffffffffffff, r2, r2, 0x1, 0xffffffffffffffff]}, 0x80) syz_clone(0xc0800400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000dc0)={&(0x7f0000000480)='prq_report\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 11:20:36 executing program 5: ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) close(r1) write$cgroup_subtree(r0, 0x0, 0xda00) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1a, 0xb, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2c5, 0x0, 0x0, 0x0, 0x1}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, @initr0, @map_fd={0x18, 0xb}, @exit, @exit]}, 0x0, 0x64, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a40)={0x0, 0x3, 0x401, 0xfffffffd}, 0x10, 0xffffffffffffffff}, 0x80) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.events.local\x00', 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000300), 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 11:20:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b4637eaa1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab9912b2b9c326f8af55453d720910c22f25693e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e812b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23812645114f7b3b9d4213c17a342973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="850000002f000000350000000000000085000000070000009500000000000000f4670880271e3503200ffa95a2c81f000000000000006287066c4554800c5f9810e805e0b737126ea6f7dc39cd34d5aeed8d38586bb6e22ff5dde54704d25c79949c23e2eb15d755a2350ea7c09cc28d7673294f42a5f0a8320e13822c45c0f8612c84da2f6c076f587d712c7e93363af3d95433bb755a2dd576090c4867a7b6393e36856386d5ec15beb59686ca7034ff9cd41c03727209d031f40f3012e9576e51a7f550afc852003b2f7846c744ae6af3e4195cc037102124d85cec48416949e129970152e3a8e809179009a60b213c8b2759987e6d067a97f5fe47fe5f17fdab800f4104dbaba46aa43a815b1e5c6d1d224264be6c4d7f47ef21eb7e46f9aa4a9779f8555eaea768c1f2c221c110ef25253d110ce282ab76f593277c04b8c5324812696a623cd8a4f8dc8dcba00b010400008207993202b7bdbcbf8496b9a951667d5127d5a555c7b88b5c0ba0e37b56c0ebfb19a34268335648e1f844ce328c10752a42dca56fb98c1452b6518a6ef7297f7b2744419af53e5309ec91d83cf0fbd775d9c07d8d591a4dac60ff0084190000b78863e629b3b20000000000000000000000000000449c810d3174c8057ee5f469a171e2cc6001e911eb5181072fe9c40499172a6de0016001ead1857f94de9ab600042dc1e340961b0bbceadce98fdd8ac21cd1473ff9549e08ada969489a8154b34992dff74c3983e8355a7b37de356727010aa9243625ab4c8c40067107ce86005cff55d2232eeda85c7b50e5622c8ae3b5557bd647c2865b3bdcb9e708c15f1aea394ea59b2b9bd249ec6b3860c795ea87b8660e3faa4523c6e02c09eaa9fb02d71cf3e70a582b8e5912bde83a84251cf7e50dd923404df28905c5e1dcb277026d881b955513f3f1d5f2dc4685fb9cb8fac4c83c5a5a5a5184d49ec3497baa161c4ad8538cf757942c1bd604c7987c8f5aecc6d0ee6072cd450f117fa1dcbfb51fb1ae906e3fc815f13ff122000000000000000000000000000000000000da129c4082e7bdaf5436e696a15cf66b07ff5c946e489e0fb95902bb20a96c1ee681dfb0e2c5cd91c49739b5b134f2a8676d301cbbf501fc6fb2fd5c514973eddeb87e69c068981f8efc3e5c3e622173fc52749c862bd9fa932f7745aaeea2615312ff467ef7a39b9ba9a18f4436c95e3d0a2203a05e4fb2dd8fa9f6cd03e7091606a1daa0ed62e2c385cf7eeb99b2a8b35f28"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc084fe8f722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc86, 0x1a, &(0x7f0000000040)="08b04a9b42c4939980741c3dc7fc17d8276a194d93249b29a289a4009822130c0600a98fc018cf8070d1a27dce1241974f2e875ffeba15", &(0x7f00000005c0)="658b432bc799f2038d2d2b3887fcb504e455f80a6baa35db00b8c0b1cc483cb73f853d23033fff4172051584a5ee8f7c42cc5222606bd49521f55dd274dae6976e4c53427aedebb3c693f4eca060dc5cdd776dabff84b77639d121dc366177a67dff61064d35db95928b000000000000378828f9b3fe19d11e24b85234c74518050ce30fc317f27d7f4a2ca50c35686bec066493c0800e3b806c3d3793992602d009244c828947b322b3e9fb28b5b17c9dcb8e83ba"}, 0x28) 11:20:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x47}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x47}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:39 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b4637eaa1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab9912b2b9c326f8af55453d720910c22f25693e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e812b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23812645114f7b3b9d4213c17a342973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r0, 0xe0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0xfffff000, 0xe, 0x0, &(0x7f00000000c0)="61df712bc084fe8f722780b6c2a7", 0x0, 0x8000, 0x0, 0xfffffffffffffc86, 0x1a, &(0x7f0000000040)="08b04a9b42c4939980741c3dc7fc17d8276a194d93249b29a289a4009822130c0600a98fc018cf8070d1a27dce1241974f2e875ffeba15", &(0x7f00000005c0)="658b432bc799f2038d2d2b3887fcb504e455f80a6baa35db00b8c0b1cc483cb73f853d23033fff4172051584a5ee8f7c42cc5222606bd49521f55dd274dae6976e4c53427aedebb3c693f4eca060dc5cdd776dabff84b77639d121dc366177a67dff61064d35db95928b000000000000378828f9b3fe19d11e24b85234c74518050ce30fc317f27d7f4a2ca50c35686bec066493c0800e3b806c3d3793992602d009244c828947b322b3e9fb28b5b17c9dcb8e83ba"}, 0x28) 11:20:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x47}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x35af000000000000}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r0 = perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x7, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffff41e, 0x2, 0x9, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x386, 0x2, @perf_config_ext={0x9, 0x2}, 0x2200, 0x6, 0x5, 0x7, 0xec, 0x1, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffff381}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3, 0x7, 0x9, 0x29, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x2, @perf_bp, 0x0, 0x5, 0x3, 0x5, 0x7fffffff, 0x101, 0xfffc, 0x0, 0x0, 0x0, 0xf0}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xa) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc0506617, &(0x7f0000000040)=0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000300)='GPL\x00', 0xb, 0x2c, &(0x7f0000000340)=""/44, 0x100, 0x0, '\x00', r2, 0x0, r3, 0x8, &(0x7f0000000380)={0x8, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[r1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8000}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}]}, &(0x7f0000000400)='syzkaller\x00', 0x5, 0x12, &(0x7f0000000440)=""/18, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x2, 0x5, 0x4}, 0x10}, 0x80) syz_clone(0x74809480, 0x0, 0xffffffffa0030000, &(0x7f0000000040), 0x0, 0x0) 11:20:41 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:41 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x47}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 11:20:41 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') 11:20:41 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, 0x0}, 0x80) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) 11:20:41 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0xaa, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6f9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r1, 0x0, 0x4010) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x10, 0x7f, 0x0, 0x0, 0x80, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0000, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x18004, 0x6, 0x0, 0x3, 0x100000001, 0x40009, 0x80, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x5a0c0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e09000000034c000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)=':\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10}, 0x0) [ 784.619906][T14638] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 784.728215][T14638] batman_adv: batadv0: Adding interface: team0 [ 784.791589][T14638] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 784.914943][T14638] batman_adv: batadv0: Interface activated: team0 11:20:42 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) [ 785.146308][T14638] device team0 entered promiscuous mode [ 785.183262][T14638] device team_slave_0 entered promiscuous mode [ 785.206501][T14638] device team_slave_1 entered promiscuous mode 11:20:42 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, 0x0}, 0x80) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) [ 785.273261][T14641] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 785.292742][T14641] batman_adv: batadv0: Interface deactivated: team0 [ 785.300027][T14641] batman_adv: batadv0: Removing interface: team0 11:20:42 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 785.326731][T14641] bridge0: port 3(team0) entered blocking state [ 785.392276][T14641] bridge0: port 3(team0) entered disabled state [ 785.424918][T14641] bridge0: port 3(team0) entered blocking state [ 785.431316][T14641] bridge0: port 3(team0) entered forwarding state 11:20:43 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') 11:20:43 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0xaa, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6f9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r1, 0x0, 0x4010) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x10, 0x7f, 0x0, 0x0, 0x80, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0000, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x18004, 0x6, 0x0, 0x3, 0x100000001, 0x40009, 0x80, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x5a0c0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e09000000034c000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)=':\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10}, 0x0) 11:20:43 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) [ 785.855545][T14665] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 786.034437][T14665] bridge0: port 3(team0) entered disabled state 11:20:43 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') 11:20:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, 0x0}, 0x80) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) 11:20:43 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 786.208208][T14665] batman_adv: batadv0: Adding interface: team0 [ 786.268926][T14665] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 786.434210][T14665] batman_adv: batadv0: Interface activated: team0 11:20:44 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 786.640117][T14667] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 786.684546][T14667] batman_adv: batadv0: Interface deactivated: team0 [ 786.723578][T14667] batman_adv: batadv0: Removing interface: team0 [ 786.800227][T14667] bridge0: port 3(team0) entered blocking state [ 786.874513][T14667] bridge0: port 3(team0) entered disabled state [ 786.915018][T14667] bridge0: port 3(team0) entered blocking state [ 786.921437][T14667] bridge0: port 3(team0) entered forwarding state 11:20:44 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, 0x0}, 0x80) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) 11:20:44 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') 11:20:44 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0xaa, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6f9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r1, 0x0, 0x4010) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x10, 0x7f, 0x0, 0x0, 0x80, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0000, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x18004, 0x6, 0x0, 0x3, 0x100000001, 0x40009, 0x80, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x5a0c0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e09000000034c000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)=':\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10}, 0x0) 11:20:44 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0xd09, 0x12) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x9) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000009b1e000000000000000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='jbd2_handle_extend\x00', r5}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000200)=ANY=[], 0x4ea00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f0000000340)={[{0x2d, 'rdma'}, {0x5a, 'rdma'}, {0x2d, 'hugetlb'}, {0x2d, 'rdma'}, {0x2b, 'blkio'}, {0x2b, 'blkio'}]}, 0x29) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000025) write$cgroup_int(r0, &(0x7f0000000380)=0x8001, 0x12) 11:20:44 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0xaa, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6f9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r1, 0x0, 0x4010) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x10, 0x7f, 0x0, 0x0, 0x80, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0000, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x18004, 0x6, 0x0, 0x3, 0x100000001, 0x40009, 0x80, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x5a0c0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e09000000034c000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)=':\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10}, 0x0) [ 787.278872][T14707] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 787.356433][T14707] bridge0: port 3(team0) entered disabled state 11:20:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 787.641751][T14707] batman_adv: batadv0: Adding interface: team0 11:20:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 787.690855][T14707] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 11:20:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 787.764754][T14707] batman_adv: batadv0: Interface activated: team0 [ 787.934387][T14697] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 787.945527][T14697] batman_adv: batadv0: Interface deactivated: team0 11:20:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') 11:20:45 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 788.000429][T14697] batman_adv: batadv0: Removing interface: team0 [ 788.178296][T14697] bridge0: port 3(team0) entered blocking state [ 788.243226][T14697] bridge0: port 3(team0) entered disabled state 11:20:45 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 788.294886][T14697] bridge0: port 3(team0) entered blocking state [ 788.301288][T14697] bridge0: port 3(team0) entered forwarding state [ 788.371490][T14701] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 11:20:45 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0xaa, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6f9, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x0, 0x11) sendmsg$kcm(r1, 0x0, 0x4010) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x10, 0x7f, 0x0, 0x0, 0x80, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff0000, 0x4, @perf_config_ext={0x7, 0x100000000}, 0x18004, 0x6, 0x0, 0x3, 0x100000001, 0x40009, 0x80, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x5a0c0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7ffe}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e09000000034c000e000a001400000002800000121f", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0xb002, &(0x7f0000000500)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)=':\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x10, 0x110, 0x1}], 0x10}, 0x0) 11:20:46 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 788.417362][T14701] batman_adv: batadv0: Adding interface: team0 [ 788.423574][T14701] batman_adv: batadv0: The MTU of interface team0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 11:20:46 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, 0x0}, 0x80) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) 11:20:46 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x51a899b0) r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0xff00, 0x80fe}, 0x80, &(0x7f0000000000)=[{&(0x7f00000001c0)="f4103300022b2c25e994efd18498d66205baa68754a3f5ffffff050000000000000011000000000011000002", 0x38}], 0x1}, 0x0) socketpair(0x22, 0x2, 0xfffffffc, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 788.708312][T14701] batman_adv: batadv0: Interface activated: team0 11:20:46 executing program 2: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r2, &(0x7f0000000400)={&(0x7f00000002c0)=@qipcrtr={0x2a, 0x3, 0x4001}, 0x80, &(0x7f0000001980)=[{&(0x7f0000000680)}, {&(0x7f0000000380)="306514bfe41383b0de3f147aeddb3c5acb6c1fc964053bf351ff6e8912d1fb72b9a7599128fb0009730d1399d9875506307923aff6b698ce9ae37a883e81d4b855df6320ebfd7d22d6038c87589071d7672011ffe5c87b230fff0387e450d61233dac60b6c478fb28f65fa", 0x6b}, {&(0x7f0000000500)="d961663fcc351976b527b7b47341bc177ab19857ff9d8b0fceb714e67785575b051f182ee77e35d521e6e26b3c4ea7f908b28b88968e66303162f1d3ee51045e50a1d7c4bee970ef390376676d33512e5c63abb2994e848caff01e0b2f111f240bc3dcc5bb97b0c19b4795df54f3f5daef", 0x71}, {&(0x7f0000001680)="865e9e5165e992c5c2c5cb4e19a48e34b0fc39152bfd5886c7e5f651c3c72b3aababcb98ea3f9e624731e96b9b3c06a21a3ec8c21d1a447175cd759cb44b547fca5f1c45005a01c62c9ad1542cbecb0e3cee60dc224b", 0x56}, {0x0}, {&(0x7f00000017c0)="9b576f70216b7222024328a63fafa107a8e511aefe140175097dfcc710dab7f1c47c6e84cbd3a6cca25d4cb1fc21b83f71ccb62a5110f46090b8febff9b34f4a550a2bb7a0b65d9967d75e8d4d842a422c93dedd0d22b7dc00324b59155282ece1d14164b7e91dbb7c3432b77a0ee0c4a8d59c9db9abcf078d518332a2bb8b5e2ab94a98d2e3fe7115b49c738bfb94a53627e37305c4105d055db9089b4cea61743a8ec2b6fd3ef34fa6a2fccb2baefa65f36f7c0b671e40b6d02c3f741aa5e3f950ade98c7b02f7a7b263d63b9e429374b70242d7888758a893424741a2eb", 0xdf}, {&(0x7f00000018c0)="3e1024dafc456f94957dbf775aca95c9cdde827397bc1587873a5c9e0535c3f986c0dd6825c0941104c6415e8b7d930a0b8ce7d066e72d10825d51fc6caf9f68e2e4fe1bceb2140f8db7570b191eee3d7e67da13eda0ea3a31f5e8529661e37654b16cb1163f08c283fa9c215318d343e6bac88ed94738e2d959b8123f0ba4", 0x7f}], 0x7, &(0x7f0000001a00)=[{0x90, 0x0, 0x0, "3815f8ef29fecb167ac80d5c50c06302361f6265a132a85bea273ab11a88c812e70c98e2c6e2c00c766cfbb6731d58367701d65dccb81075312ab25993c6d6938506d72ed8a2ada4b7070edcb55148003e917c12a601a674e0e7389a649bd35cf3782d866bc8a16ad93758b28af63efc321a0903f8c85867bf89eee06039"}], 0x90}, 0x18000) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="1b0000001800810ae00212ba0d81c7d91c8582dc12a80600", 0x18}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r3}) r4 = socket$kcm(0xa, 0x2, 0x11) close(r4) r5 = perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x0, 0x4, 0x1, 0x0, 0x7d5, 0x18108, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffe22d, 0x4, @perf_config_ext={0x504b, 0xffffffffffffff32}, 0x0, 0xffffffffffffffc8, 0xb0, 0x0, 0xffffffffffffffff, 0xffff, 0x0, 0x0, 0xe00000, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='&@*^)h:\x00') [ 789.804620][T14752] batman_adv: batadv0: Interface activated: team0 [ 789.820425][T14754] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 11:20:47 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, 0x0}, 0x80) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) [ 789.859422][T14754] batman_adv: batadv0: Interface deactivated: team0 [ 789.893905][T14754] batman_adv: batadv0: Removing interface: team0 [ 789.939698][T14754] bridge0: port 3(team0) entered blocking state [ 789.976445][T14754] bridge0: port 3(team0) entered disabled state [ 790.020289][T14754] bridge0: port 3(team0) entered blocking state [ 790.026741][T14754] bridge0: port 3(team0) entered forwarding state 11:20:47 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3377}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x35af000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x0, 0x8, 0xfd, 0xaa, 0x0, 0xc5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f7c0000, 0x4, @perf_config_ext={0x2, 0x81}, 0x4e128, 0x2, 0x800, 0x5, 0x0, 0x8, 0x800, 0x0, 0x2c8}, r2, 0x4, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000011c0)={0x2, 0x80, 0x2, 0x7, 0x18, 0x40, 0x0, 0x10001, 0x88504, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200ffff, 0x1, @perf_bp={&(0x7f0000001180), 0x1}, 0x1000, 0xca, 0x9, 0x1, 0x5, 0x5, 0x5, 0x0, 0x2}, r2, 0xb, r0, 0x1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f00000008c0)="3214d8ad1836e1ee39cd42f57cf91b03c9b1baaabc7801fab78353c0632e093733b4aeb776c88a380f6cf716b6b863d84fb4eccd7ae704fcd8c77a1b549b6b1ccad00d73125761f52e79567d995502b22534a1c7a6b09c7b6ecf8089d25fc6da301c447301bf7189a970b4d4c8fdf54658c7b50db5e3b4c13efa80eb574527bd716854f46642726f0460bf74b6e42d3cc198ad297122c2bf33775564d65d7e3e7021d95a53692b9cdbbe2e68660b967575c5e50591b176f0f9a7a5d00e6ac43676b58ce8802280e093b3a85ca4e4acbc", 0x1, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="182e54c4c6b4850000000200002adff070ec1630c4738f00415100000000ff0f0000b4000000850000007c000000185b00000c00"/63], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000240)=""/36, 0x41100, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001240)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x8}, 0xc) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x6, 0x12, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000030000001800000001001000000000000400000018530000080000000000000000000000185100000100000000000000000000009d65c0ff0000000018600000080000000000000003000000183300000200000000000000000000008510000003000000bd5a0c0004000000850000007700000006400200010000009500000000000000"], &(0x7f0000000a00)='syzkaller\x00', 0x80000001, 0xc6, &(0x7f0000000f00)=""/198, 0x0, 0xa, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001000)={0x5, 0xb, 0x1000, 0x6}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0xb, 0x7, &(0x7f0000000100)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0x5}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x5, 0x2, 0x0, r3}, @ldst={0x3, 0x1, 0x0, 0x2, 0x2, 0x30, 0x8}], &(0x7f0000000280)='GPL\x00', 0x0, 0x9b, &(0x7f00000002c0)=""/155, 0x41000, 0x4, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000380)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x6, 0x7, 0x5}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f00000010c0)=[r0]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xe8010000000000) [ 790.122544][T14776] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 11:20:47 executing program 5: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xfb, 0x0, 0x1, 0x0, 0x9, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0xffff, 0xaecc}, 0x48, 0x81, 0x8, 0x9, 0x3ff, 0x7fffffff, 0xf9, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x35abfd2581de430f) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%dc\xe3\xd7\\b}\x1f\nY\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2]\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\t9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x00\b\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 [ 794.895035][T14881] dump_stack_lvl+0xcd/0x134 [ 794.899666][T14881] dump_header+0x10b/0x7f9 [ 794.904123][T14881] oom_kill_process.cold+0x10/0x15 [ 794.909280][T14881] out_of_memory+0x358/0x14a0 [ 794.914012][T14881] ? oom_killer_disable+0x270/0x270 [ 794.919254][T14881] ? io_schedule_timeout+0x140/0x140 [ 794.924571][T14881] ? perf_trace_preemptirq_template+0xa2/0x440 [ 794.930783][T14881] mem_cgroup_out_of_memory+0x206/0x270 [ 794.936368][T14881] ? mem_cgroup_margin+0x130/0x130 [ 794.941538][T14881] memory_max_write+0x2f5/0x3c0 [ 794.946436][T14881] ? mem_cgroup_force_empty_write+0x150/0x150 [ 794.952547][T14881] ? lock_release+0x780/0x780 [ 794.957264][T14881] cgroup_file_write+0x1de/0x770 [ 794.962239][T14881] ? mem_cgroup_force_empty_write+0x150/0x150 [ 794.968341][T14881] ? kill_css+0x370/0x370 [ 794.972693][T14881] ? __phys_addr+0xc4/0x140 [ 794.977235][T14881] ? kill_css+0x370/0x370 [ 794.981578][T14881] kernfs_fop_write_iter+0x3f8/0x610 [ 794.986901][T14881] vfs_write+0x9e9/0xdd0 [ 794.991253][T14881] ? kernel_write+0x630/0x630 [ 794.995955][T14881] ? __fget_files+0x26a/0x440 [ 795.000664][T14881] ksys_write+0x127/0x250 [ 795.005010][T14881] ? __ia32_sys_read+0xb0/0xb0 [ 795.009791][T14881] ? syscall_enter_from_user_mode+0x22/0xb0 [ 795.015712][T14881] do_syscall_64+0x35/0xb0 [ 795.020154][T14881] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 795.026067][T14881] RIP: 0033:0x7f9d5cc8b5a9 [ 795.030490][T14881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 795.050117][T14881] RSP: 002b:00007f9d5d956168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 795.058548][T14881] RAX: ffffffffffffffda RBX: 00007f9d5cdac050 RCX: 00007f9d5cc8b5a9 11:20:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) 11:20:52 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 795.066526][T14881] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 795.074504][T14881] RBP: 00007f9d5cce67b0 R08: 0000000000000000 R09: 0000000000000000 [ 795.082569][T14881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 795.090545][T14881] R13: 00007ffc595c1f5f R14: 00007f9d5d956300 R15: 0000000000022000 [ 795.098546][T14881] [ 795.189439][T14881] memory: usage 11776kB, limit 0kB, failcnt 75 [ 795.198371][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 795.198388][ T28] audit: type=1804 audit(1667474452.717:58): pid=14895 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir941722048/syzkaller.Ik8Hgp/36/memory.events" dev="sda1" ino=1177 res=1 errno=0 11:20:52 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) 11:20:52 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 795.254394][T14881] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 795.299240][T14881] Memory cgroup stats for /syz2: [ 795.300467][T14881] anon 147456 [ 795.300467][T14881] file 10461184 [ 795.300467][T14881] kernel 1449984 [ 795.300467][T14881] kernel_stack 98304 [ 795.300467][T14881] pagetables 77824 [ 795.300467][T14881] percpu 14352 [ 795.300467][T14881] sock 0 [ 795.300467][T14881] vmalloc 4096 [ 795.300467][T14881] shmem 10452992 [ 795.300467][T14881] zswap 0 [ 795.300467][T14881] zswapped 0 [ 795.300467][T14881] file_mapped 331776 [ 795.300467][T14881] file_dirty 8192 [ 795.300467][T14881] file_writeback 0 [ 795.300467][T14881] swapcached 0 [ 795.300467][T14881] anon_thp 0 [ 795.300467][T14881] file_thp 0 [ 795.300467][T14881] shmem_thp 0 [ 795.300467][T14881] inactive_anon 147456 [ 795.300467][T14881] active_anon 10452992 [ 795.300467][T14881] inactive_file 4096 [ 795.300467][T14881] active_file 4096 [ 795.300467][T14881] unevictable 0 [ 795.300467][T14881] slab_reclaimable 106040 [ 795.300467][T14881] slab_unreclaimable 1120984 [ 795.300467][T14881] slab 1227024 11:20:53 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfffffffffffffed2) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3377}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x35af000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = gettid() perf_event_open(&(0x7f0000001280)={0x0, 0x80, 0x0, 0x8, 0xfd, 0xaa, 0x0, 0xc5, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1f7c0000, 0x4, @perf_config_ext={0x2, 0x81}, 0x4e128, 0x2, 0x800, 0x5, 0x0, 0x8, 0x800, 0x0, 0x2c8}, r2, 0x4, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f00000011c0)={0x2, 0x80, 0x2, 0x7, 0x18, 0x40, 0x0, 0x10001, 0x88504, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x200ffff, 0x1, @perf_bp={&(0x7f0000001180), 0x1}, 0x1000, 0xca, 0x9, 0x1, 0x5, 0x5, 0x5, 0x0, 0x2}, r2, 0xb, r0, 0x1) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280), &(0x7f00000008c0)="3214d8ad1836e1ee39cd42f57cf91b03c9b1baaabc7801fab78353c0632e093733b4aeb776c88a380f6cf716b6b863d84fb4eccd7ae704fcd8c77a1b549b6b1ccad00d73125761f52e79567d995502b22534a1c7a6b09c7b6ecf8089d25fc6da301c447301bf7189a970b4d4c8fdf54658c7b50db5e3b4c13efa80eb574527bd716854f46642726f0460bf74b6e42d3cc198ad297122c2bf33775564d65d7e3e7021d95a53692b9cdbbe2e68660b967575c5e50591b176f0f9a7a5d00e6ac43676b58ce8802280e093b3a85ca4e4acbc", 0x1, 0xffffffffffffffff, 0x4}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x18, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="182e54c4c6b4850000000200002adff070ec1630c4738f00415100000000ff0f0000b4000000850000007c000000185b00000c00"/63], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x24, &(0x7f0000000240)=""/36, 0x41100, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000009c0), 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000001240)='rcu_utilization\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000540)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x4, 0x8}, 0xc) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001040)={0x6, 0x12, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000030000001800000001001000000000000400000018530000080000000000000000000000185100000100000000000000000000009d65c0ff0000000018600000080000000000000003000000183300000200000000000000000000008510000003000000bd5a0c0004000000850000007700000006400200010000009500000000000000"], &(0x7f0000000a00)='syzkaller\x00', 0x80000001, 0xc6, &(0x7f0000000f00)=""/198, 0x0, 0xa, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001000)={0x5, 0xb, 0x1000, 0x6}, 0x10}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0xb, 0x7, &(0x7f0000000100)=@raw=[@cb_func={0x18, 0x2, 0x4, 0x0, 0x5}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80000001}, @map_val={0x18, 0x5, 0x2, 0x0, r3}, @ldst={0x3, 0x1, 0x0, 0x2, 0x2, 0x30, 0x8}], &(0x7f0000000280)='GPL\x00', 0x0, 0x9b, &(0x7f00000002c0)=""/155, 0x41000, 0x4, '\x00', 0x0, 0x7, r0, 0x8, &(0x7f0000000380)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x6, 0x7, 0x5}, 0x10, 0xffffffffffffffff, r4, 0x0, &(0x7f00000010c0)=[r0]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xe8010000000000) 11:20:53 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 11:20:53 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) [ 795.475592][ T28] audit: type=1804 audit(1667474452.987:59): pid=14903 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir941722048/syzkaller.Ik8Hgp/37/memory.events" dev="sda1" ino=1183 res=1 errno=0 11:20:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = syz_clone(0x4050000, &(0x7f0000000300)="6490a7f0380161b8bd6bad9a51ea321eac07bf11b442c02ebd452de96ed3139050f21f40b5d41861beb1d68c43b69c62923f19c8ccf33d757b3f3af3ec20f23f9bc4a377c196104344c3e0e0d59bacff54c870587b4309cc78479cc213", 0x5d, 0x0, 0x0, &(0x7f0000001440)="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") perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80043000, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x17faf0}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 795.584580][T14881] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=13867,uid=0 [ 795.655740][ T28] audit: type=1804 audit(1667474453.177:60): pid=14912 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir941722048/syzkaller.Ik8Hgp/38/memory.events" dev="sda1" ino=1182 res=1 errno=0 [ 795.944851][T14881] Memory cgroup out of memory: Killed process 13867 (syz-executor.2) total-vm:50560kB, anon-rss:464kB, file-rss:9120kB, shmem-rss:64kB, UID:0 pgtables:68kB oom_score_adj:0 11:20:54 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 11:20:54 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x0) 11:20:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = syz_clone(0x4050000, &(0x7f0000000300)="6490a7f0380161b8bd6bad9a51ea321eac07bf11b442c02ebd452de96ed3139050f21f40b5d41861beb1d68c43b69c62923f19c8ccf33d757b3f3af3ec20f23f9bc4a377c196104344c3e0e0d59bacff54c870587b4309cc78479cc213", 0x5d, 0x0, 0x0, &(0x7f0000001440)="62200622e9cb179b52b4378dfb9ff328dd0bf286f44a28a9acabdea99e47efc9b7ae96170cc5dee72c1df55f8d1cfd66fa10635a4e8860aa19c9eace501a95cb8c2086695fdcf7b0e1825506ccd82ead2a37e33904153dcbb1bd0a5b1b4c7ff2a08b056f861a6c3ce68b7038589af299e6c3fd168efb126df4c1409a431af2d394f925e6c47557e7326b902bbc8db666f168d4f2e1bbdb1de8d1f54be1413c705c0fdf4f673fe9b8e0187a07b5df17c22adbd318194198cd36770dcb76549b92c16564dfccf9568c493e13857eeb1140ff2915c9394fbe08a46d6a764e27dff6d5829d1c097bb7e32261655aac87bb015ce3fb5dd7ab1bda1fe4dd290f4a295357e85fc567a91ee978fa63ea8374206a03f7c3eec3662f9f939a3b28479cdce9cf794935b5c26147a6a55663572ebefce1f47f813837e60d326a1af91170df4485a1abd32725262361c167d820cc134ad7ce68b8e4c7bfb97809b4e5901c023378e64a75f2a1416dbf154eb14c544de0ab5df6b30ad8059e5a929230490ddcb3c7a3092b00fccf26fd44b45fdbf8ee0a3453aafb72072bf349c5aaaaf48980f3dc6da70fe6cedccd5c849598c2a3d84db4a1d3c0303cdb96b735e1ea5f302221") perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80043000, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x17faf0}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:20:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = syz_clone(0x4050000, &(0x7f0000000300)="6490a7f0380161b8bd6bad9a51ea321eac07bf11b442c02ebd452de96ed3139050f21f40b5d41861beb1d68c43b69c62923f19c8ccf33d757b3f3af3ec20f23f9bc4a377c196104344c3e0e0d59bacff54c870587b4309cc78479cc213", 0x5d, 0x0, 0x0, &(0x7f0000001440)="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") perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80043000, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x17faf0}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:20:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 11:20:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 11:20:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 796.606136][ T28] audit: type=1804 audit(1667474454.127:61): pid=14934 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3855654948/syzkaller.63LspP/386/memory.events" dev="sda1" ino=1183 res=1 errno=0 11:20:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 11:20:54 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 796.751088][ T28] audit: type=1804 audit(1667474454.127:62): pid=14936 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir941722048/syzkaller.Ik8Hgp/39/memory.events" dev="sda1" ino=1185 res=1 errno=0 11:20:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100044, 0x600000000000000) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 797.091134][ T28] audit: type=1804 audit(1667474454.427:63): pid=14943 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3855654948/syzkaller.63LspP/387/memory.events" dev="sda1" ino=1179 res=1 errno=0 [ 797.389291][ T28] audit: type=1804 audit(1667474454.787:64): pid=14950 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir3855654948/syzkaller.63LspP/388/memory.events" dev="sda1" ino=1188 res=1 errno=0 11:20:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = syz_clone(0x4050000, &(0x7f0000000300)="6490a7f0380161b8bd6bad9a51ea321eac07bf11b442c02ebd452de96ed3139050f21f40b5d41861beb1d68c43b69c62923f19c8ccf33d757b3f3af3ec20f23f9bc4a377c196104344c3e0e0d59bacff54c870587b4309cc78479cc213", 0x5d, 0x0, 0x0, &(0x7f0000001440)="62200622e9cb179b52b4378dfb9ff328dd0bf286f44a28a9acabdea99e47efc9b7ae96170cc5dee72c1df55f8d1cfd66fa10635a4e8860aa19c9eace501a95cb8c2086695fdcf7b0e1825506ccd82ead2a37e33904153dcbb1bd0a5b1b4c7ff2a08b056f861a6c3ce68b7038589af299e6c3fd168efb126df4c1409a431af2d394f925e6c47557e7326b902bbc8db666f168d4f2e1bbdb1de8d1f54be1413c705c0fdf4f673fe9b8e0187a07b5df17c22adbd318194198cd36770dcb76549b92c16564dfccf9568c493e13857eeb1140ff2915c9394fbe08a46d6a764e27dff6d5829d1c097bb7e32261655aac87bb015ce3fb5dd7ab1bda1fe4dd290f4a295357e85fc567a91ee978fa63ea8374206a03f7c3eec3662f9f939a3b28479cdce9cf794935b5c26147a6a55663572ebefce1f47f813837e60d326a1af91170df4485a1abd32725262361c167d820cc134ad7ce68b8e4c7bfb97809b4e5901c023378e64a75f2a1416dbf154eb14c544de0ab5df6b30ad8059e5a929230490ddcb3c7a3092b00fccf26fd44b45fdbf8ee0a3453aafb72072bf349c5aaaaf48980f3dc6da70fe6cedccd5c849598c2a3d84db4a1d3c0303cdb96b735e1ea5f302221") perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80043000, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x17faf0}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 797.537397][T14947] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 797.624357][T14947] CPU: 1 PID: 14947 Comm: syz-executor.5 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 797.634495][T14947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 797.644587][T14947] Call Trace: [ 797.647885][T14947] [ 797.650834][T14947] dump_stack_lvl+0xcd/0x134 [ 797.655450][T14947] dump_header+0x10b/0x7f9 [ 797.659888][T14947] oom_kill_process.cold+0x10/0x15 [ 797.665019][T14947] out_of_memory+0x358/0x14a0 [ 797.669727][T14947] ? oom_killer_disable+0x270/0x270 [ 797.674957][T14947] ? io_schedule_timeout+0x140/0x140 [ 797.680261][T14947] ? perf_trace_preemptirq_template+0xa2/0x440 [ 797.686452][T14947] mem_cgroup_out_of_memory+0x206/0x270 [ 797.692013][T14947] ? mem_cgroup_margin+0x130/0x130 [ 797.697160][T14947] memory_max_write+0x2f5/0x3c0 [ 797.702033][T14947] ? mem_cgroup_force_empty_write+0x150/0x150 [ 797.708127][T14947] ? lock_release+0x780/0x780 [ 797.712819][T14947] cgroup_file_write+0x1de/0x770 [ 797.717777][T14947] ? mem_cgroup_force_empty_write+0x150/0x150 [ 797.723864][T14947] ? kill_css+0x370/0x370 [ 797.728205][T14947] ? __phys_addr+0xc4/0x140 [ 797.732744][T14947] ? kill_css+0x370/0x370 [ 797.737087][T14947] kernfs_fop_write_iter+0x3f8/0x610 [ 797.742414][T14947] vfs_write+0x9e9/0xdd0 [ 797.746678][T14947] ? kernel_write+0x630/0x630 [ 797.751379][T14947] ? __fget_files+0x26a/0x440 [ 797.756088][T14947] ksys_write+0x127/0x250 [ 797.760441][T14947] ? __ia32_sys_read+0xb0/0xb0 [ 797.765224][T14947] ? syscall_enter_from_user_mode+0x22/0xb0 [ 797.771146][T14947] do_syscall_64+0x35/0xb0 [ 797.775587][T14947] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 797.781504][T14947] RIP: 0033:0x7f009108b5a9 [ 797.785933][T14947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 797.805549][T14947] RSP: 002b:00007f008fddd168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 797.813978][T14947] RAX: ffffffffffffffda RBX: 00007f00911ac050 RCX: 00007f009108b5a9 [ 797.821957][T14947] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 797.829936][T14947] RBP: 00007f00910e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 797.837911][T14947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 797.845890][T14947] R13: 00007fff966bd24f R14: 00007f008fddd300 R15: 0000000000022000 [ 797.853891][T14947] 11:20:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 11:20:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = syz_clone(0x4050000, &(0x7f0000000300)="6490a7f0380161b8bd6bad9a51ea321eac07bf11b442c02ebd452de96ed3139050f21f40b5d41861beb1d68c43b69c62923f19c8ccf33d757b3f3af3ec20f23f9bc4a377c196104344c3e0e0d59bacff54c870587b4309cc78479cc213", 0x5d, 0x0, 0x0, &(0x7f0000001440)="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") perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80043000, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x17faf0}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:20:55 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 798.217139][T14947] memory: usage 10932kB, limit 0kB, failcnt 169 [ 798.287619][T14947] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 798.377722][T14947] Memory cgroup stats for /syz5: [ 798.377925][T14947] anon 147456 [ 798.377925][T14947] file 10481664 [ 798.377925][T14947] kernel 565248 [ 798.377925][T14947] kernel_stack 98304 [ 798.377925][T14947] pagetables 81920 [ 798.377925][T14947] percpu 3696 [ 798.377925][T14947] sock 0 [ 798.377925][T14947] vmalloc 4096 [ 798.377925][T14947] shmem 10452992 [ 798.377925][T14947] zswap 0 [ 798.377925][T14947] zswapped 0 [ 798.377925][T14947] file_mapped 331776 [ 798.377925][T14947] file_dirty 24576 [ 798.377925][T14947] file_writeback 0 [ 798.377925][T14947] swapcached 0 [ 798.377925][T14947] anon_thp 0 [ 798.377925][T14947] file_thp 0 [ 798.377925][T14947] shmem_thp 0 [ 798.377925][T14947] inactive_anon 147456 [ 798.377925][T14947] active_anon 10452992 [ 798.377925][T14947] inactive_file 12288 [ 798.377925][T14947] active_file 16384 [ 798.377925][T14947] unevictable 0 [ 798.377925][T14947] slab_reclaimable 54832 [ 798.377925][T14947] slab_unreclaimable 290792 [ 798.377925][T14947] slab 345624 [ 798.881345][T14947] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=14942,uid=0 11:20:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, 0x0) r1 = socket$kcm(0x2, 0x200000000000001, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(r1, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) r2 = syz_clone(0x4050000, &(0x7f0000000300)="6490a7f0380161b8bd6bad9a51ea321eac07bf11b442c02ebd452de96ed3139050f21f40b5d41861beb1d68c43b69c62923f19c8ccf33d757b3f3af3ec20f23f9bc4a377c196104344c3e0e0d59bacff54c870587b4309cc78479cc213", 0x5d, 0x0, 0x0, &(0x7f0000001440)="62200622e9cb179b52b4378dfb9ff328dd0bf286f44a28a9acabdea99e47efc9b7ae96170cc5dee72c1df55f8d1cfd66fa10635a4e8860aa19c9eace501a95cb8c2086695fdcf7b0e1825506ccd82ead2a37e33904153dcbb1bd0a5b1b4c7ff2a08b056f861a6c3ce68b7038589af299e6c3fd168efb126df4c1409a431af2d394f925e6c47557e7326b902bbc8db666f168d4f2e1bbdb1de8d1f54be1413c705c0fdf4f673fe9b8e0187a07b5df17c22adbd318194198cd36770dcb76549b92c16564dfccf9568c493e13857eeb1140ff2915c9394fbe08a46d6a764e27dff6d5829d1c097bb7e32261655aac87bb015ce3fb5dd7ab1bda1fe4dd290f4a295357e85fc567a91ee978fa63ea8374206a03f7c3eec3662f9f939a3b28479cdce9cf794935b5c26147a6a55663572ebefce1f47f813837e60d326a1af91170df4485a1abd32725262361c167d820cc134ad7ce68b8e4c7bfb97809b4e5901c023378e64a75f2a1416dbf154eb14c544de0ab5df6b30ad8059e5a929230490ddcb3c7a3092b00fccf26fd44b45fdbf8ee0a3453aafb72072bf349c5aaaaf48980f3dc6da70fe6cedccd5c849598c2a3d84db4a1d3c0303cdb96b735e1ea5f302221") perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r1, &(0x7f0000001400)={0x0, 0x80043000, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x17faf0}], 0x4, 0x0, 0x0, 0x40020002}, 0x6d70) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:20:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 798.935854][T14947] Memory cgroup out of memory: Killed process 14946 (syz-executor.5) total-vm:56712kB, anon-rss:508kB, file-rss:8992kB, shmem-rss:164kB, UID:0 pgtables:88kB oom_score_adj:1000 [ 798.972787][T12946] syz-executor.4 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=1, oom_score_adj=0 [ 799.008708][T12946] CPU: 0 PID: 12946 Comm: syz-executor.4 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 799.018842][T12946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 799.028934][T12946] Call Trace: [ 799.032234][T12946] [ 799.035193][T12946] dump_stack_lvl+0xcd/0x134 [ 799.039821][T12946] dump_header+0x10b/0x7f9 [ 799.044273][T12946] oom_kill_process.cold+0x10/0x15 [ 799.049426][T12946] out_of_memory+0x358/0x14a0 [ 799.054150][T12946] ? oom_killer_disable+0x270/0x270 [ 799.059385][T12946] ? find_held_lock+0x2d/0x110 [ 799.064189][T12946] mem_cgroup_out_of_memory+0x206/0x270 [ 799.069846][T12946] ? mem_cgroup_margin+0x130/0x130 [ 799.074989][T12946] ? lock_downgrade+0x6e0/0x6e0 [ 799.079887][T12946] try_charge_memcg+0xf67/0x13f0 [ 799.084869][T12946] ? mem_cgroup_handle_over_high+0x510/0x510 [ 799.090882][T12946] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 799.096630][T12946] ? lock_downgrade+0x6e0/0x6e0 [ 799.101510][T12946] ? lock_downgrade+0x6e0/0x6e0 [ 799.106403][T12946] obj_cgroup_charge+0x2ab/0x5e0 [ 799.111380][T12946] ? kvmalloc_node+0x3f/0x1b0 [ 799.116079][T12946] __kmalloc_node+0xa7/0x380 [ 799.120706][T12946] kvmalloc_node+0x3f/0x1b0 [ 799.125238][T12946] xt_alloc_table_info+0x3c/0xa0 [ 799.130276][T12946] do_ip6t_set_ctl+0x508/0xb20 [ 799.135130][T12946] ? __mutex_lock+0x231/0x1350 [ 799.139926][T12946] ? compat_do_replace.constprop.0+0x410/0x410 [ 799.146126][T12946] ? wait_for_completion_io_timeout+0x20/0x20 [ 799.152219][T12946] ? __lock_acquire+0x166e/0x56d0 [ 799.157292][T12946] ? nf_sockopt_find.constprop.0+0x22d/0x2a0 [ 799.163389][T12946] nf_setsockopt+0x83/0xe0 [ 799.167847][T12946] ipv6_setsockopt+0x127/0x190 [ 799.172691][T12946] tcp_setsockopt+0x9b/0x100 [ 799.177327][T12946] __sys_setsockopt+0x2d6/0x690 [ 799.182216][T12946] ? sock_common_recvmsg+0x190/0x190 [ 799.187568][T12946] ? __ia32_sys_recv+0x100/0x100 [ 799.192618][T12946] ? up_write+0x470/0x470 [ 799.196997][T12946] ? syscall_enter_from_user_mode+0x22/0xb0 [ 799.202925][T12946] __x64_sys_setsockopt+0xba/0x150 [ 799.208080][T12946] ? syscall_enter_from_user_mode+0x22/0xb0 [ 799.214012][T12946] do_syscall_64+0x35/0xb0 [ 799.218475][T12946] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 799.224410][T12946] RIP: 0033:0x7f7347e8cbfa [ 799.228846][T12946] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 799.248477][T12946] RSP: 002b:00007ffdf7ef81b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 799.256923][T12946] RAX: ffffffffffffffda RBX: 0000000000000029 RCX: 00007f7347e8cbfa [ 799.264918][T12946] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 799.272911][T12946] RBP: 00007ffdf7ef81e0 R08: 0000000000000558 R09: feff646b666d606c [ 799.280909][T12946] R10: 00007f7347f81940 R11: 0000000000000206 R12: 00007ffdf7ef8240 [ 799.288905][T12946] R13: 0000000000000003 R14: 00007ffdf7ef81dc R15: 00007f7347f818e0 [ 799.296920][T12946] 11:20:56 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 799.804438][T12946] memory: usage 10364kB, limit 0kB, failcnt 56 [ 799.810687][T12946] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 800.032672][T12946] Memory cgroup stats for /syz4: [ 800.032894][T12946] anon 45056 [ 800.032894][T12946] file 10469376 [ 800.032894][T12946] kernel 98304 [ 800.032894][T12946] kernel_stack 0 [ 800.032894][T12946] pagetables 8192 [ 800.032894][T12946] percpu 0 [ 800.032894][T12946] sock 0 [ 800.032894][T12946] vmalloc 0 [ 800.032894][T12946] shmem 10452992 [ 800.032894][T12946] zswap 0 [ 800.032894][T12946] zswapped 0 [ 800.032894][T12946] file_mapped 188416 [ 800.032894][T12946] file_dirty 12288 [ 800.032894][T12946] file_writeback 0 [ 800.032894][T12946] swapcached 0 [ 800.032894][T12946] anon_thp 0 [ 800.032894][T12946] file_thp 0 [ 800.032894][T12946] shmem_thp 0 [ 800.032894][T12946] inactive_anon 45056 [ 800.032894][T12946] active_anon 10452992 [ 800.032894][T12946] inactive_file 4096 [ 800.032894][T12946] active_file 12288 [ 800.032894][T12946] unevictable 0 [ 800.032894][T12946] slab_reclaimable 45008 [ 800.032894][T12946] slab_unreclaimable 36216 [ 800.032894][T12946] slab 81224 [ 800.185016][T12946] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=12946,uid=0 [ 800.205795][T12946] Memory cgroup out of memory: Killed process 12946 (syz-executor.4) total-vm:50560kB, anon-rss:464kB, file-rss:9120kB, shmem-rss:64kB, UID:0 pgtables:72kB oom_score_adj:0 [ 800.262064][ T4678] syz-executor.3 invoked oom-killer: gfp_mask=0xc40(GFP_NOFS), order=0, oom_score_adj=0 [ 800.274329][ T4678] CPU: 0 PID: 4678 Comm: syz-executor.3 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 800.284360][ T4678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 800.294442][ T4678] Call Trace: [ 800.297739][ T4678] [ 800.300686][ T4678] dump_stack_lvl+0xcd/0x134 [ 800.305316][ T4678] dump_header+0x10b/0x7f9 [ 800.309768][ T4678] oom_kill_process.cold+0x10/0x15 [ 800.314914][ T4678] out_of_memory+0x358/0x14a0 [ 800.319649][ T4678] ? oom_killer_disable+0x270/0x270 [ 800.324891][ T4678] ? find_held_lock+0x2d/0x110 [ 800.329791][ T4678] mem_cgroup_out_of_memory+0x206/0x270 [ 800.335369][ T4678] ? mem_cgroup_margin+0x130/0x130 [ 800.340512][ T4678] ? lock_downgrade+0x6e0/0x6e0 [ 800.345405][ T4678] try_charge_memcg+0xf67/0x13f0 [ 800.350381][ T4678] ? mem_cgroup_handle_over_high+0x510/0x510 [ 800.356393][ T4678] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 800.362139][ T4678] ? lock_downgrade+0x6e0/0x6e0 [ 800.367042][ T4678] obj_cgroup_charge+0x2ab/0x5e0 [ 800.372017][ T4678] kmem_cache_alloc_lru+0x13e/0x720 [ 800.377245][ T4678] ? ext4_alloc_inode+0x24/0x650 [ 800.382212][ T4678] ? ext4_free_in_core_inode+0x70/0x70 [ 800.387700][ T4678] ext4_alloc_inode+0x24/0x650 [ 800.392493][ T4678] ? ext4_free_in_core_inode+0x70/0x70 [ 800.397977][ T4678] alloc_inode+0x61/0x230 [ 800.402352][ T4678] iget_locked+0x1b7/0x6f0 [ 800.406802][ T4678] __ext4_iget+0x3a1/0x4140 [ 800.411371][ T4678] ? ext4_get_projid+0x190/0x190 [ 800.416346][ T4678] ? rcu_read_lock_sched_held+0x3a/0x70 [ 800.421929][ T4678] ? kfree+0x1fb/0x580 [ 800.426043][ T4678] ext4_lookup+0x383/0x700 [ 800.430484][ T4678] ? ext4_resetent+0x2d0/0x2d0 [ 800.435302][ T4678] __lookup_slow+0x24c/0x460 [ 800.439929][ T4678] ? __lookup_hash+0x180/0x180 [ 800.444731][ T4678] ? smc_llc_do_confirm_rkey+0xb60/0xde0 [ 800.450496][ T4678] ? smc_llc_do_confirm_rkey+0xb60/0xde0 [ 800.456170][ T4678] ? lookup_fast+0x14e/0x520 [ 800.460806][ T4678] walk_component+0x33f/0x5a0 [ 800.465521][ T4678] path_lookupat+0x1ba/0x840 [ 800.470153][ T4678] filename_lookup+0x1ce/0x590 [ 800.474954][ T4678] ? may_linkat+0x510/0x510 [ 800.479496][ T4678] ? __might_fault+0xd1/0x170 [ 800.484227][ T4678] ? __check_object_size+0x2de/0x700 [ 800.489554][ T4678] ? strncpy_from_user+0x287/0x3c0 [ 800.494707][ T4678] ? getname_flags.part.0+0x1dd/0x4f0 [ 800.500132][ T4678] user_path_at_empty+0x42/0x60 [ 800.505030][ T4678] __x64_sys_umount+0xf8/0x180 [ 800.509830][ T4678] ? path_umount+0x10a0/0x10a0 [ 800.514627][ T4678] ? syscall_enter_from_user_mode+0x22/0xb0 [ 800.520551][ T4678] ? syscall_enter_from_user_mode+0x22/0xb0 [ 800.526485][ T4678] do_syscall_64+0x35/0xb0 [ 800.530942][ T4678] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 800.536873][ T4678] RIP: 0033:0x7fd27b68ca17 [ 800.541304][ T4678] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 800.560934][ T4678] RSP: 002b:00007ffca6692108 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 800.569379][ T4678] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd27b68ca17 [ 800.577375][ T4678] RDX: 00007ffca66921e0 RSI: 000000000000000a RDI: 00007ffca66921d0 [ 800.585366][ T4678] RBP: 00007ffca66921d0 R08: 00000000ffffffff R09: 00007ffca6691fa0 [ 800.593356][ T4678] R10: 0000555556dcd90b R11: 0000000000000246 R12: 00007fd27b6e5826 [ 800.601349][ T4678] R13: 00007ffca6693290 R14: 0000555556dcd810 R15: 00007ffca66932d0 [ 800.609361][ T4678] [ 800.630839][ T4678] memory: usage 11168kB, limit 0kB, failcnt 55 [ 800.638618][ T4678] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 800.646030][ T4678] Memory cgroup stats for /syz3: [ 800.646408][ T4678] anon 57344 [ 800.646408][ T4678] file 10493952 [ 800.646408][ T4678] kernel 884736 [ 800.646408][ T4678] kernel_stack 0 [ 800.646408][ T4678] pagetables 8192 [ 800.646408][ T4678] percpu 10656 [ 800.646408][ T4678] sock 0 [ 800.646408][ T4678] vmalloc 0 [ 800.646408][ T4678] shmem 10452992 [ 800.646408][ T4678] zswap 0 [ 800.646408][ T4678] zswapped 0 [ 800.646408][ T4678] file_mapped 294912 [ 800.646408][ T4678] file_dirty 0 [ 800.646408][ T4678] file_writeback 0 [ 800.646408][ T4678] swapcached 0 [ 800.646408][ T4678] anon_thp 0 [ 800.646408][ T4678] file_thp 0 [ 800.646408][ T4678] shmem_thp 0 [ 800.646408][ T4678] inactive_anon 57344 [ 800.646408][ T4678] active_anon 10452992 [ 800.646408][ T4678] inactive_file 40960 [ 800.646408][ T4678] active_file 0 [ 800.646408][ T4678] unevictable 0 [ 800.646408][ T4678] slab_reclaimable 88160 [ 800.646408][ T4678] slab_unreclaimable 768944 [ 800.646408][ T4678] slab 857104 [ 800.770044][ T4678] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=4678,uid=0 [ 800.793416][ T4678] Memory cgroup out of memory: Killed process 4678 (syz-executor.3) total-vm:50560kB, anon-rss:468kB, file-rss:9120kB, shmem-rss:64kB, UID:0 pgtables:68kB oom_score_adj:0 [ 800.823113][T13039] syz-executor.5 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=1, oom_score_adj=0 [ 800.854857][T13039] CPU: 0 PID: 13039 Comm: syz-executor.5 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 800.864992][T13039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 800.875063][T13039] Call Trace: [ 800.878343][T13039] [ 800.881283][T13039] dump_stack_lvl+0xcd/0x134 [ 800.885891][T13039] dump_header+0x10b/0x7f9 [ 800.890321][T13039] oom_kill_process.cold+0x10/0x15 [ 800.895445][T13039] out_of_memory+0x358/0x14a0 [ 800.900146][T13039] ? oom_killer_disable+0x270/0x270 [ 800.905362][T13039] ? find_held_lock+0x2d/0x110 [ 800.910155][T13039] mem_cgroup_out_of_memory+0x206/0x270 [ 800.915711][T13039] ? mem_cgroup_margin+0x130/0x130 [ 800.920827][T13039] ? lock_downgrade+0x6e0/0x6e0 [ 800.925785][T13039] try_charge_memcg+0xf67/0x13f0 [ 800.930742][T13039] ? mem_cgroup_handle_over_high+0x510/0x510 [ 800.936733][T13039] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 800.942467][T13039] ? lock_downgrade+0x6e0/0x6e0 [ 800.947328][T13039] ? lock_downgrade+0x6e0/0x6e0 [ 800.952196][T13039] obj_cgroup_charge+0x2ab/0x5e0 [ 800.957154][T13039] ? kvmalloc_node+0x3f/0x1b0 [ 800.961834][T13039] __kmalloc_node+0xa7/0x380 [ 800.966444][T13039] kvmalloc_node+0x3f/0x1b0 [ 800.970956][T13039] xt_alloc_table_info+0x3c/0xa0 [ 800.975915][T13039] do_ip6t_set_ctl+0x508/0xb20 [ 800.980703][T13039] ? __mutex_lock+0x231/0x1350 [ 800.985483][T13039] ? compat_do_replace.constprop.0+0x410/0x410 [ 800.991659][T13039] ? wait_for_completion_io_timeout+0x20/0x20 [ 800.997734][T13039] ? __lock_acquire+0x166e/0x56d0 [ 801.002778][T13039] ? nf_sockopt_find.constprop.0+0x22d/0x2a0 [ 801.008779][T13039] nf_setsockopt+0x83/0xe0 [ 801.013215][T13039] ipv6_setsockopt+0x127/0x190 [ 801.018002][T13039] tcp_setsockopt+0x9b/0x100 [ 801.022620][T13039] __sys_setsockopt+0x2d6/0x690 [ 801.027485][T13039] ? sock_common_recvmsg+0x190/0x190 [ 801.032786][T13039] ? __ia32_sys_recv+0x100/0x100 [ 801.037730][T13039] ? up_write+0x470/0x470 [ 801.042086][T13039] ? syscall_enter_from_user_mode+0x22/0xb0 [ 801.047997][T13039] __x64_sys_setsockopt+0xba/0x150 [ 801.053121][T13039] ? syscall_enter_from_user_mode+0x22/0xb0 [ 801.059033][T13039] do_syscall_64+0x35/0xb0 [ 801.063470][T13039] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 801.069378][T13039] RIP: 0033:0x7f009108cbfa [ 801.073798][T13039] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 801.093409][T13039] RSP: 002b:00007fff966bcdb8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 801.101831][T13039] RAX: ffffffffffffffda RBX: 0000000000000029 RCX: 00007f009108cbfa [ 801.109806][T13039] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 801.117791][T13039] RBP: 00007fff966bcde0 R08: 0000000000000558 R09: feff646b666d606c [ 801.125769][T13039] R10: 00007f0091181940 R11: 0000000000000206 R12: 00007fff966bce40 [ 801.133752][T13039] R13: 0000000000000003 R14: 00007fff966bcddc R15: 00007f00911818e0 [ 801.141752][T13039] [ 801.190235][T13039] memory: usage 10600kB, limit 0kB, failcnt 188 [ 801.204806][T13039] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 801.211703][T13039] Memory cgroup stats for /syz5: [ 801.211909][T13039] anon 49152 [ 801.211909][T13039] file 10485760 [ 801.211909][T13039] kernel 303104 [ 801.211909][T13039] kernel_stack 0 [ 801.211909][T13039] pagetables 8192 [ 801.211909][T13039] percpu 3552 [ 801.211909][T13039] sock 0 [ 801.211909][T13039] vmalloc 0 [ 801.211909][T13039] shmem 10452992 [ 801.211909][T13039] zswap 0 [ 801.211909][T13039] zswapped 0 [ 801.211909][T13039] file_mapped 294912 [ 801.211909][T13039] file_dirty 0 [ 801.211909][T13039] file_writeback 0 [ 801.211909][T13039] swapcached 0 [ 801.211909][T13039] anon_thp 0 [ 801.211909][T13039] file_thp 0 [ 801.211909][T13039] shmem_thp 0 [ 801.211909][T13039] inactive_anon 49152 [ 801.211909][T13039] active_anon 10452992 [ 801.211909][T13039] inactive_file 28672 [ 801.211909][T13039] active_file 4096 [ 801.211909][T13039] unevictable 0 [ 801.211909][T13039] slab_reclaimable 43448 [ 801.211909][T13039] slab_unreclaimable 240528 [ 801.211909][T13039] slab 283976 [ 801.325133][T13039] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=13039,uid=0 [ 801.354461][T13039] Memory cgroup out of memory: Killed process 13039 (syz-executor.5) total-vm:50560kB, anon-rss:464kB, file-rss:9120kB, shmem-rss:64kB, UID:0 pgtables:72kB oom_score_adj:0 [ 801.616823][ T9571] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 801.627841][ T9571] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 801.637462][T12956] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 801.645929][T12956] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 801.654093][T12956] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 801.661405][T12956] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 801.670097][T14997] Bluetooth: hci1: HCI_REQ-0x0c1a [ 802.048573][T14997] chnl_net:caif_netlink_parms(): no params data found [ 802.103924][ T93] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.191829][ T93] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.318415][ T93] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.339819][T14997] bridge0: port 1(bridge_slave_0) entered blocking state [ 802.347544][T14997] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.358355][T14997] device bridge_slave_0 entered promiscuous mode [ 802.394839][ T93] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.446918][T14997] bridge0: port 2(bridge_slave_1) entered blocking state [ 802.454063][T14997] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.482318][T14997] device bridge_slave_1 entered promiscuous mode [ 802.595421][T14997] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 802.627916][T14997] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 802.665694][ T93] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.707180][T14997] team0: Port device team_slave_0 added [ 802.715261][T14997] team0: Port device team_slave_1 added [ 802.752071][ T93] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.786965][T14997] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 802.793952][T14997] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 802.855060][T14997] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 802.872568][ T93] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 802.895337][T14997] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 802.902310][T14997] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 802.948527][T14997] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 803.013323][ T93] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.040084][T14997] device hsr_slave_0 entered promiscuous mode [ 803.047112][T14997] device hsr_slave_1 entered promiscuous mode [ 803.053763][T14997] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 803.061674][T14997] Cannot create hsr debugfs directory [ 803.285601][ T93] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.412252][ T93] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.517806][T14997] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.634690][ T93] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.695851][T14997] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.746958][ T93] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 803.757526][T12956] Bluetooth: hci1: command 0x0409 tx timeout [ 803.925201][T14997] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.095307][T14997] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 804.158999][ T93] device h0 left promiscuous mode [ 804.237623][ T93] device h1 left promiscuous mode [ 804.325219][ T93] device h2 left promiscuous mode [ 804.362952][T14997] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 804.373023][T14997] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 804.392234][T14997] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 804.415977][ T93] device h3 left promiscuous mode [ 804.427771][T14997] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 804.565644][T14997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 804.581709][T12820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 804.590172][T12820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 804.607648][T14997] 8021q: adding VLAN 0 to HW filter on device team0 [ 804.629980][T12820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 804.639800][T12820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 804.648495][T12820] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.655644][T12820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 804.678765][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 804.687584][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 804.696833][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 804.706487][T12818] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.713615][T12818] bridge0: port 2(bridge_slave_1) entered forwarding state [ 804.721629][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 804.730765][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 804.740301][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 804.759497][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 804.901701][T14997] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 804.912505][T14997] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 804.925675][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 804.933720][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 804.942787][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 804.951422][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 804.960669][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 804.969534][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 804.978448][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 805.051015][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 805.164187][T14997] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 805.173322][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 805.182083][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 805.236405][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 805.246222][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 805.305544][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 805.313978][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 805.334085][T14997] device veth0_vlan entered promiscuous mode [ 805.389215][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 805.405224][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 805.428024][T14997] device veth1_vlan entered promiscuous mode [ 805.510652][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 805.520573][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 805.533137][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 805.542543][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 805.606095][T14997] device veth0_macvtap entered promiscuous mode [ 805.618033][T14997] device veth1_macvtap entered promiscuous mode [ 805.635659][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 805.647608][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.657870][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 805.668597][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.688606][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 805.708022][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.722019][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 805.741871][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.753661][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 805.765956][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.776206][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 805.787116][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.799504][T14997] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 805.823694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 805.832051][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 805.840198][T12956] Bluetooth: hci1: command 0x041b tx timeout [ 805.847195][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 805.856496][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 805.892307][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 805.904122][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.915662][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 805.927119][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.937145][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 805.947818][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.958177][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 805.968868][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.978870][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 805.989558][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 805.999909][T14997] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 806.010684][T14997] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 806.021719][T14997] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 806.051219][T11788] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 806.063889][T11788] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 806.077481][T14997] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.086948][T14997] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.095760][T14997] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.104814][T14997] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 806.123491][ T93] device hsr_slave_0 left promiscuous mode [ 806.130513][ T93] device hsr_slave_1 left promiscuous mode [ 806.138699][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 806.146381][ T93] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 806.155612][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 806.163019][ T93] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 806.172273][ T93] bridge0: port 3(team0) entered disabled state [ 806.180054][ T93] device bridge_slave_1 left promiscuous mode [ 806.188960][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.199430][ T93] device bridge_slave_0 left promiscuous mode [ 806.205874][ T93] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.220848][ T93] device hsr_slave_0 left promiscuous mode [ 806.227505][ T93] device hsr_slave_1 left promiscuous mode [ 806.233847][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 806.244188][ T93] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 806.254078][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 806.261686][ T93] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 806.270223][ T93] device bridge_slave_1 left promiscuous mode [ 806.276468][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.285364][ T93] device bridge_slave_0 left promiscuous mode [ 806.291531][ T93] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.302169][ T93] device hsr_slave_0 left promiscuous mode [ 806.313177][ T93] device hsr_slave_1 left promiscuous mode [ 806.319798][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 806.327344][ T93] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 806.336949][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 806.344701][ T93] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 806.354070][ T93] bridge0: port 3(team0) entered disabled state [ 806.364273][ T93] device bridge_slave_1 left promiscuous mode [ 806.370434][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.378794][ T93] device bridge_slave_0 left promiscuous mode [ 806.385195][ T93] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.407101][ T93] device hsr_slave_0 left promiscuous mode [ 806.413411][ T93] device hsr_slave_1 left promiscuous mode [ 806.420188][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 806.427896][ T93] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 806.437633][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 806.445380][ T93] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 806.453714][ T93] device bridge_slave_1 left promiscuous mode [ 806.460222][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 806.471675][ T93] device bridge_slave_0 left promiscuous mode [ 806.478663][ T93] bridge0: port 1(bridge_slave_0) entered disabled state [ 806.499123][ T93] device veth1_macvtap left promiscuous mode [ 806.505222][ T93] device veth0_macvtap left promiscuous mode [ 806.511270][ T93] device veth1_vlan left promiscuous mode [ 806.517455][ T93] device veth0_vlan left promiscuous mode [ 806.524156][ T93] device veth1_macvtap left promiscuous mode [ 806.530681][ T93] device veth0_macvtap left promiscuous mode [ 806.536916][ T93] device veth1_vlan left promiscuous mode [ 806.542683][ T93] device veth0_vlan left promiscuous mode [ 806.550168][ T93] device veth1_macvtap left promiscuous mode [ 806.561546][ T93] device veth0_macvtap left promiscuous mode [ 806.568140][ T93] device veth1_vlan left promiscuous mode [ 806.573942][ T93] device veth0_vlan left promiscuous mode [ 806.581688][ T93] device veth1_macvtap left promiscuous mode [ 806.588391][ T93] device veth0_macvtap left promiscuous mode [ 806.594616][ T93] device veth1_vlan left promiscuous mode [ 806.600397][ T93] device veth0_vlan left promiscuous mode [ 807.156920][ T93] device team_slave_1 left promiscuous mode [ 807.167160][ T93] team0 (unregistering): Port device team_slave_1 removed [ 807.181258][ T93] device team_slave_0 left promiscuous mode [ 807.188916][ T93] team0 (unregistering): Port device team_slave_0 removed [ 807.203001][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 807.221963][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 807.286957][ T93] bond0 (unregistering): Released all slaves [ 807.399668][ T93] team0 (unregistering): Port device team_slave_1 removed [ 807.415032][ T93] team0 (unregistering): Port device team_slave_0 removed [ 807.430216][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 807.456120][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 807.523404][ T93] bond0 (unregistering): Released all slaves [ 807.642084][ T93] device team_slave_1 left promiscuous mode [ 807.650308][ T93] team0 (unregistering): Port device team_slave_1 removed [ 807.663582][ T93] device team_slave_0 left promiscuous mode [ 807.671060][ T93] team0 (unregistering): Port device team_slave_0 removed [ 807.689708][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 807.703859][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 807.766125][ T93] bond0 (unregistering): Released all slaves [ 807.914513][T12956] Bluetooth: hci1: command 0x040f tx timeout [ 808.061978][ T93] team0 (unregistering): Port device team_slave_1 removed [ 808.078447][ T93] team0 (unregistering): Port device team_slave_0 removed [ 808.092924][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 808.107843][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 808.170472][ T93] bond0 (unregistering): Released all slaves [ 808.319103][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.325672][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 [ 808.949867][T15114] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 808.976248][T15114] CPU: 0 PID: 15114 Comm: syz-executor.2 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 808.986375][T15114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 808.996460][T15114] Call Trace: [ 808.999763][T15114] [ 809.002768][T15114] dump_stack_lvl+0xcd/0x134 [ 809.007401][T15114] dump_header+0x10b/0x7f9 [ 809.011863][T15114] oom_kill_process.cold+0x10/0x15 [ 809.017019][T15114] out_of_memory+0x358/0x14a0 [ 809.021749][T15114] ? oom_killer_disable+0x270/0x270 [ 809.026996][T15114] ? io_schedule_timeout+0x140/0x140 [ 809.032318][T15114] mem_cgroup_out_of_memory+0x206/0x270 [ 809.037904][T15114] ? mem_cgroup_margin+0x130/0x130 [ 809.043076][T15114] memory_max_write+0x2f5/0x3c0 [ 809.047975][T15114] ? mem_cgroup_force_empty_write+0x150/0x150 [ 809.054095][T15114] ? lock_release+0x780/0x780 [ 809.058814][T15114] cgroup_file_write+0x1de/0x770 [ 809.063793][T15114] ? mem_cgroup_force_empty_write+0x150/0x150 [ 809.069901][T15114] ? kill_css+0x370/0x370 [ 809.074283][T15114] ? kill_css+0x370/0x370 [ 809.078649][T15114] kernfs_fop_write_iter+0x3f8/0x610 [ 809.083998][T15114] vfs_write+0x9e9/0xdd0 [ 809.088281][T15114] ? kernel_write+0x630/0x630 [ 809.092991][T15114] ? lockdep_hardirqs_on+0x79/0x100 [ 809.098223][T15114] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 809.104424][T15114] ksys_write+0x127/0x250 [ 809.108779][T15114] ? __ia32_sys_read+0xb0/0xb0 [ 809.113569][T15114] ? syscall_enter_from_user_mode+0x22/0xb0 [ 809.119490][T15114] do_syscall_64+0x35/0xb0 [ 809.123941][T15114] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 809.129858][T15114] RIP: 0033:0x7fc8c108b5a9 [ 809.134281][T15114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 809.153909][T15114] RSP: 002b:00007fc8c1da6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 809.162333][T15114] RAX: ffffffffffffffda RBX: 00007fc8c11abf80 RCX: 00007fc8c108b5a9 [ 809.170313][T15114] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 809.178290][T15114] RBP: 00007fc8c10e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 809.186270][T15114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 809.194261][T15114] R13: 00007ffcce13073f R14: 00007fc8c1da6300 R15: 0000000000022000 [ 809.202275][T15114] [ 809.232593][T15114] memory: usage 10772kB, limit 0kB, failcnt 75 [ 809.255633][T15114] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 809.263301][T15114] Memory cgroup stats for /syz2: [ 809.263516][T15114] anon 118784 [ 809.263516][T15114] file 10452992 [ 809.263516][T15114] kernel 446464 [ 809.263516][T15114] kernel_stack 98304 [ 809.263516][T15114] pagetables 77824 [ 809.263516][T15114] percpu 144 [ 809.263516][T15114] sock 0 [ 809.263516][T15114] vmalloc 4096 [ 809.263516][T15114] shmem 10452992 [ 809.263516][T15114] zswap 0 [ 809.263516][T15114] zswapped 0 [ 809.263516][T15114] file_mapped 331776 [ 809.263516][T15114] file_dirty 0 [ 809.263516][T15114] file_writeback 0 [ 809.263516][T15114] swapcached 0 [ 809.263516][T15114] anon_thp 0 [ 809.263516][T15114] file_thp 0 [ 809.263516][T15114] shmem_thp 0 [ 809.263516][T15114] inactive_anon 118784 [ 809.263516][T15114] active_anon 10452992 [ 809.263516][T15114] inactive_file 0 [ 809.263516][T15114] active_file 0 [ 809.263516][T15114] unevictable 0 [ 809.263516][T15114] slab_reclaimable 54240 [ 809.263516][T15114] slab_unreclaimable 186048 [ 809.263516][T15114] slab 240288 11:21:06 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 11:21:06 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 11:21:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000140)=""/201, 0x26, 0xc9, 0x1}, 0x20) 11:21:06 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 11:21:06 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 11:21:06 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000560000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x8) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 809.379642][T15114] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=15112,uid=0 [ 809.400321][T15114] Memory cgroup out of memory: Killed process 15114 (syz-executor.2) total-vm:56712kB, anon-rss:500kB, file-rss:8992kB, shmem-rss:156kB, UID:0 pgtables:80kB oom_score_adj:1000 [ 809.482296][T14997] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 809.501555][T14997] CPU: 1 PID: 14997 Comm: syz-executor.2 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 809.511671][T14997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 809.521754][T14997] Call Trace: [ 809.525055][T14997] [ 809.528003][T14997] dump_stack_lvl+0xcd/0x134 [ 809.532638][T14997] dump_header+0x10b/0x7f9 [ 809.537184][T14997] oom_kill_process.cold+0x10/0x15 [ 809.542330][T14997] out_of_memory+0x358/0x14a0 [ 809.547051][T14997] ? find_held_lock+0x2d/0x110 [ 809.551862][T14997] ? oom_killer_disable+0x270/0x270 [ 809.557283][T14997] ? find_held_lock+0x2d/0x110 [ 809.562076][T14997] mem_cgroup_out_of_memory+0x206/0x270 [ 809.567643][T14997] ? mem_cgroup_margin+0x130/0x130 [ 809.572761][T14997] ? lock_downgrade+0x6e0/0x6e0 [ 809.577646][T14997] try_charge_memcg+0xf67/0x13f0 [ 809.582606][T14997] ? mem_cgroup_handle_over_high+0x510/0x510 [ 809.588601][T14997] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 809.594333][T14997] ? lock_downgrade+0x6e0/0x6e0 [ 809.599221][T14997] obj_cgroup_charge+0x2ab/0x5e0 [ 809.604203][T14997] kmem_cache_alloc_lru+0x13e/0x720 [ 809.609421][T14997] ? __d_alloc+0x32/0x980 [ 809.613770][T14997] __d_alloc+0x32/0x980 [ 809.617940][T14997] ? __lock_acquire+0x166e/0x56d0 [ 809.622977][T14997] d_alloc+0x4a/0x230 [ 809.626974][T14997] ? __lock_acquire+0x166e/0x56d0 [ 809.632015][T14997] d_alloc_parallel+0xe4/0x1400 [ 809.636891][T14997] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 809.642880][T14997] ? __d_lookup_rcu+0x4c0/0x4c0 [ 809.647748][T14997] ? lockdep_init_map_type+0x21a/0x7f0 [ 809.653216][T14997] ? lockdep_init_map_type+0x21a/0x7f0 [ 809.658692][T14997] __lookup_slow+0x193/0x460 [ 809.663299][T14997] ? __lookup_hash+0x180/0x180 [ 809.668083][T14997] ? smc_llc_do_confirm_rkey+0xb60/0xde0 [ 809.673743][T14997] ? smc_llc_do_confirm_rkey+0xb60/0xde0 [ 809.679402][T14997] ? lookup_fast+0x14e/0x520 [ 809.684018][T14997] walk_component+0x33f/0x5a0 [ 809.688716][T14997] path_lookupat+0x1ba/0x840 [ 809.693338][T14997] filename_lookup+0x1ce/0x590 [ 809.698126][T14997] ? may_linkat+0x510/0x510 [ 809.702646][T14997] ? __might_fault+0xd1/0x170 [ 809.707355][T14997] ? __check_object_size+0x2de/0x700 [ 809.712667][T14997] ? strncpy_from_user+0x287/0x3c0 [ 809.717799][T14997] ? getname_flags.part.0+0x1dd/0x4f0 [ 809.723202][T14997] user_path_at_empty+0x42/0x60 [ 809.728085][T14997] __x64_sys_umount+0xf8/0x180 [ 809.732868][T14997] ? path_umount+0x10a0/0x10a0 [ 809.737655][T14997] ? syscall_enter_from_user_mode+0x22/0xb0 [ 809.743562][T14997] ? syscall_enter_from_user_mode+0x22/0xb0 [ 809.749474][T14997] do_syscall_64+0x35/0xb0 [ 809.753910][T14997] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 809.759820][T14997] RIP: 0033:0x7fc8c108ca17 [ 809.764330][T14997] Code: ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 31 f6 e9 09 00 00 00 66 0f 1f 84 00 00 00 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 809.783945][T14997] RSP: 002b:00007ffcce12f898 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 809.792369][T14997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc8c108ca17 [ 809.800343][T14997] RDX: 00007ffcce12f96a RSI: 000000000000000a RDI: 00007ffcce12f960 [ 809.808316][T14997] RBP: 00007ffcce12f960 R08: 00000000ffffffff R09: 00007ffcce12f730 [ 809.816290][T14997] R10: 00005555573d189b R11: 0000000000000246 R12: 00007fc8c10e5826 [ 809.824354][T14997] R13: 00007ffcce130a20 R14: 00005555573d1810 R15: 00007ffcce130a60 11:21:07 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) [ 809.832347][T14997] [ 809.884256][T14997] memory: usage 10456kB, limit 0kB, failcnt 94 [ 809.890469][T14997] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 809.920120][T14997] Memory cgroup stats for /syz2: [ 809.920362][T14997] anon 40960 [ 809.920362][T14997] file 10452992 [ 809.920362][T14997] kernel 212992 [ 809.920362][T14997] kernel_stack 0 [ 809.920362][T14997] pagetables 8192 [ 809.920362][T14997] percpu 144 [ 809.920362][T14997] sock 0 [ 809.920362][T14997] vmalloc 4096 [ 809.920362][T14997] shmem 10452992 [ 809.920362][T14997] zswap 0 [ 809.920362][T14997] zswapped 0 [ 809.920362][T14997] file_mapped 294912 [ 809.920362][T14997] file_dirty 0 [ 809.920362][T14997] file_writeback 0 [ 809.920362][T14997] swapcached 0 [ 809.920362][T14997] anon_thp 0 [ 809.920362][T14997] file_thp 0 [ 809.920362][T14997] shmem_thp 0 [ 809.920362][T14997] inactive_anon 40960 [ 809.920362][T14997] active_anon 10452992 [ 809.920362][T14997] inactive_file 0 [ 809.920362][T14997] active_file 0 [ 809.920362][T14997] unevictable 0 [ 809.920362][T14997] slab_reclaimable 41072 [ 809.920362][T14997] slab_unreclaimable 145912 [ 809.920362][T14997] slab 186984 [ 810.014925][ T3641] Bluetooth: hci1: command 0x0419 tx timeout [ 810.050053][T14997] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14997,uid=0 [ 810.146506][T14997] Memory cgroup out of memory: Killed process 14997 (syz-executor.2) total-vm:50560kB, anon-rss:444kB, file-rss:8320kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 11:21:07 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 11:21:07 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 11:21:08 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 11:21:08 executing program 1: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000001}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x20000, 0x4, 0x0, 0x0, 0x0, 0xb800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280), 0x10) r3 = gettid() perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x80a3, 0x7, 0x8, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x3ff}, r3, 0xa, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) 11:21:08 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x30004081) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100400000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xffffffffffff2d71) close(r0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x5, 0x1, 0x5, 0x1f, 0x0, 0x200000000, 0x1004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x10, 0x7ff, 0x4b59f0d1, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x1f}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)='blkio.bfq.empty_time\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x40020002}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 1 [ 813.417261][ T3633] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 813.427108][ T3633] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 813.435049][ T3633] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 813.442989][ T3633] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 813.450479][ T3633] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 813.459479][ T3633] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 813.466676][ T3633] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 813.474609][ T3633] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 813.481750][ T3633] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 813.484586][T15233] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 813.491782][ T3633] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 813.497777][T15190] Bluetooth: hci3: HCI_REQ-0x0c1a [ 813.507975][T15189] Bluetooth: hci4: HCI_REQ-0x0c1a [ 813.745049][ T93] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 813.905089][ T93] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 814.132915][T15190] chnl_net:caif_netlink_parms(): no params data found [ 814.318283][T15189] chnl_net:caif_netlink_parms(): no params data found [ 814.344728][T15190] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.351853][T15190] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.378268][T15190] device bridge_slave_0 entered promiscuous mode [ 814.442613][T15190] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.471402][T15190] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.496645][T15190] device bridge_slave_1 entered promiscuous mode [ 814.590128][T15189] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.599840][T15189] bridge0: port 1(bridge_slave_0) entered disabled state [ 814.609174][T15189] device bridge_slave_0 entered promiscuous mode [ 814.622174][T15190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 814.638796][T15189] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.646827][T15189] bridge0: port 2(bridge_slave_1) entered disabled state [ 814.655460][T15189] device bridge_slave_1 entered promiscuous mode [ 814.665630][T15190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 814.729706][T15189] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 814.743845][T15190] team0: Port device team_slave_0 added [ 814.753611][T15189] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 814.771955][T15190] team0: Port device team_slave_1 added [ 814.830028][T15190] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 814.837859][T15190] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 814.878821][T15190] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 814.895801][T15189] team0: Port device team_slave_0 added [ 814.909746][T15190] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 814.917657][T15190] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 814.949574][T15190] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 814.963773][T15189] team0: Port device team_slave_1 added [ 815.023398][T15189] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 815.030729][T15189] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 815.059677][T15189] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 815.088882][T15189] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 815.096857][T15189] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 815.134625][T15189] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 815.149940][T15190] device hsr_slave_0 entered promiscuous mode [ 815.157015][T15190] device hsr_slave_1 entered promiscuous mode [ 815.268375][ T93] device hsr_slave_0 left promiscuous mode [ 815.275284][ T3641] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 815.281675][ T93] device hsr_slave_1 left promiscuous mode [ 815.309349][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 815.319182][ T93] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 815.335895][ T93] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 815.344122][ T93] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 815.370290][ T93] device bridge_slave_1 left promiscuous mode [ 815.383286][ T93] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.393765][ T93] device bridge_slave_0 left promiscuous mode [ 815.407221][ T93] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.423868][ T93] device veth1_macvtap left promiscuous mode [ 815.438505][ T93] device veth0_macvtap left promiscuous mode [ 815.448221][ T93] device veth1_vlan left promiscuous mode [ 815.454082][ T93] device veth0_vlan left promiscuous mode [ 815.594762][ T3641] Bluetooth: hci3: command 0x0409 tx timeout [ 815.596003][T15234] Bluetooth: hci4: command 0x0409 tx timeout [ 815.645288][ T93] team0 (unregistering): Port device team_slave_1 removed [ 815.660076][ T93] team0 (unregistering): Port device team_slave_0 removed [ 815.672285][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 815.686060][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 815.746181][ T93] bond0 (unregistering): Released all slaves [ 815.815911][T15189] device hsr_slave_0 entered promiscuous mode [ 815.829403][T15189] device hsr_slave_1 entered promiscuous mode [ 815.837716][T15189] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 815.852910][T15189] Cannot create hsr debugfs directory [ 816.737652][T15190] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 816.949157][T15190] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 816.980940][T15190] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 817.141724][T15190] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 817.596336][T15190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 817.641472][T15190] 8021q: adding VLAN 0 to HW filter on device team0 [ 817.665260][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 817.673119][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 817.680484][T15234] Bluetooth: hci3: command 0x041b tx timeout [ 817.684320][T15233] Bluetooth: hci4: command 0x041b tx timeout [ 817.736235][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 817.745531][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 817.753983][ T7167] bridge0: port 1(bridge_slave_0) entered blocking state [ 817.761208][ T7167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 817.781711][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 817.789988][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 817.804397][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.812933][T11790] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.820095][T11790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.833802][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 817.857225][T15189] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 817.895132][T15189] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 817.910255][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 817.930272][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 817.943562][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 817.960096][T15189] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 818.001730][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 818.020810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 818.029684][T15233] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 818.039615][T15233] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 818.047852][T15233] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 818.056619][T15233] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 818.064183][T15233] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 818.071756][T15233] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 818.079321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 818.088610][T15293] Bluetooth: hci1: HCI_REQ-0x0c1a [ 818.089218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 818.102362][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 818.111290][T15189] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 818.147602][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 818.163016][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 818.185141][T15190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 818.444888][T15189] 8021q: adding VLAN 0 to HW filter on device bond0 [ 818.492208][T15189] 8021q: adding VLAN 0 to HW filter on device team0 [ 818.516132][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 818.523595][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 818.544745][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 818.559288][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 818.577638][T15190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.619931][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 818.631073][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 818.642020][T11790] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.649202][T11790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 818.657234][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 818.674992][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 818.683458][T11790] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.690629][T11790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 818.735019][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 818.744017][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 818.783634][T15293] chnl_net:caif_netlink_parms(): no params data found [ 818.830604][T15189] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 818.847445][T15189] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 818.870193][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 818.882594][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 818.897368][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 818.909321][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 818.923516][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 818.937798][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 818.952596][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 818.967516][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 818.978733][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 819.054187][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 819.062711][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 819.186715][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 819.215406][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 819.271561][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 819.291755][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 819.308418][T15190] device veth0_vlan entered promiscuous mode [ 819.331948][T15293] bridge0: port 1(bridge_slave_0) entered blocking state [ 819.346728][T15293] bridge0: port 1(bridge_slave_0) entered disabled state [ 819.357115][T15293] device bridge_slave_0 entered promiscuous mode [ 819.375225][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 819.383089][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 819.404928][T15190] device veth1_vlan entered promiscuous mode [ 819.411973][T15293] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.419336][T15293] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.428287][T15293] device bridge_slave_1 entered promiscuous mode [ 819.444878][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 819.452988][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 819.468732][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 819.490039][T15189] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 819.528681][T15190] device veth0_macvtap entered promiscuous mode [ 819.546490][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 819.565024][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 819.573472][ T3684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 819.595670][T15293] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 819.617457][T15190] device veth1_macvtap entered promiscuous mode [ 819.634523][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 819.643452][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 819.660148][T15293] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 819.704371][T15190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.717460][T15190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.727716][T15190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 819.738744][T15190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.750531][T15190] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 819.758272][T15233] Bluetooth: hci4: command 0x040f tx timeout [ 819.758646][ T3641] Bluetooth: hci3: command 0x040f tx timeout [ 819.782021][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 819.790840][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 819.801974][T15190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.813255][T15190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.829260][T15190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 819.854560][T15190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 819.875609][T15190] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 819.889897][T15293] team0: Port device team_slave_0 added [ 819.900810][T15293] team0: Port device team_slave_1 added [ 819.928287][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 819.943889][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 819.957050][T15190] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.967595][T15190] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.976827][T15190] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 819.985674][T15190] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 820.041176][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 820.056625][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 820.082504][T15293] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 820.104573][T15293] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 820.155086][T15234] Bluetooth: hci1: command 0x0409 tx timeout [ 820.163609][T15293] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 820.181123][T15293] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 820.189381][T15293] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 820.215751][T15293] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 820.264375][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 820.272716][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 820.354523][T15189] device veth0_vlan entered promiscuous mode [ 820.365655][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 820.373570][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 820.410114][T15293] device hsr_slave_0 entered promiscuous mode [ 820.442498][T15293] device hsr_slave_1 entered promiscuous mode [ 820.471944][T15293] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 820.484000][T15293] Cannot create hsr debugfs directory [ 820.492914][T15189] device veth1_vlan entered promiscuous mode [ 820.610462][T15384] syz-executor.4 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 820.634635][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 820.645648][T15384] CPU: 1 PID: 15384 Comm: syz-executor.4 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 820.652003][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 820.655757][T15384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 820.655777][T15384] Call Trace: [ 820.655786][T15384] [ 820.655796][T15384] dump_stack_lvl+0xcd/0x134 [ 820.655834][T15384] dump_header+0x10b/0x7f9 [ 820.655868][T15384] oom_kill_process.cold+0x10/0x15 [ 820.655903][T15384] out_of_memory+0x358/0x14a0 [ 820.698430][T15384] ? oom_killer_disable+0x270/0x270 [ 820.703663][T15384] ? io_schedule_timeout+0x140/0x140 [ 820.708970][T15384] mem_cgroup_out_of_memory+0x206/0x270 [ 820.714539][T15384] ? mem_cgroup_margin+0x130/0x130 [ 820.719691][T15384] memory_max_write+0x2f5/0x3c0 [ 820.724568][T15384] ? mem_cgroup_force_empty_write+0x150/0x150 [ 820.730664][T15384] ? mem_cgroup_force_empty_write+0x150/0x150 [ 820.736761][T15384] cgroup_file_write+0x1de/0x770 [ 820.741720][T15384] ? mem_cgroup_force_empty_write+0x150/0x150 [ 820.747807][T15384] ? kill_css+0x370/0x370 [ 820.752168][T15384] ? kill_css+0x370/0x370 [ 820.756516][T15384] kernfs_fop_write_iter+0x3f8/0x610 [ 820.761838][T15384] vfs_write+0x9e9/0xdd0 [ 820.766107][T15384] ? kernel_write+0x630/0x630 [ 820.770810][T15384] ? __fget_files+0x26a/0x440 [ 820.775870][T15384] ksys_write+0x127/0x250 [ 820.780217][T15384] ? __ia32_sys_read+0xb0/0xb0 [ 820.785004][T15384] ? syscall_enter_from_user_mode+0x22/0xb0 [ 820.790930][T15384] do_syscall_64+0x35/0xb0 [ 820.795379][T15384] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 820.801300][T15384] RIP: 0033:0x7fbf61e8b5a9 [ 820.805726][T15384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 820.825346][T15384] RSP: 002b:00007fbf62bb6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 820.833776][T15384] RAX: ffffffffffffffda RBX: 00007fbf61fabf80 RCX: 00007fbf61e8b5a9 [ 820.841758][T15384] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 820.849739][T15384] RBP: 00007fbf61ee67b0 R08: 0000000000000000 R09: 0000000000000000 [ 820.857720][T15384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 820.865699][T15384] R13: 00007ffe234059ff R14: 00007fbf62bb6300 R15: 0000000000022000 [ 820.873713][T15384] [ 820.882575][T15384] memory: usage 10636kB, limit 0kB, failcnt 75 [ 820.890266][T15384] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 820.890393][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 820.891122][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 820.898063][T15384] Memory cgroup stats for /syz4: [ 820.925895][T15384] anon 110592 [ 820.925895][T15384] file 10452992 [ 820.925895][T15384] kernel 311296 [ 820.925895][T15384] kernel_stack 65536 [ 820.925895][T15384] pagetables 77824 [ 820.925895][T15384] percpu 144 [ 820.925895][T15384] sock 0 [ 820.925895][T15384] vmalloc 4096 [ 820.925895][T15384] shmem 10452992 [ 820.925895][T15384] zswap 0 [ 820.925895][T15384] zswapped 0 [ 820.925895][T15384] file_mapped 225280 [ 820.925895][T15384] file_dirty 0 [ 820.925895][T15384] file_writeback 0 [ 820.925895][T15384] swapcached 0 [ 820.925895][T15384] anon_thp 0 [ 820.925895][T15384] file_thp 0 [ 820.925895][T15384] shmem_thp 0 [ 820.925895][T15384] inactive_anon 110592 [ 820.925895][T15384] active_anon 10452992 [ 820.925895][T15384] inactive_file 0 [ 820.925895][T15384] active_file 0 [ 820.925895][T15384] unevictable 0 [ 820.925895][T15384] slab_reclaimable 55912 [ 820.925895][T15384] slab_unreclaimable 79752 [ 820.925895][T15384] slab 135664 [ 820.931645][T15189] device veth0_macvtap entered promiscuous mode [ 820.938164][T15189] device veth1_macvtap entered promiscuous mode [ 821.040594][T15384] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz4,mems_allowed=0-1,oom_memcg=/syz4,task_memcg=/syz4,task=syz-executor.4,pid=15190,uid=0 [ 821.056472][T15384] Memory cgroup out of memory: Killed process 15190 (syz-executor.4) total-vm:50560kB, anon-rss:444kB, file-rss:8320kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 821.197012][ T9] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 821.246781][T15189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 821.257850][T15189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 821.284413][T15189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 821.304305][T15189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 821.314199][T15189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 821.334256][T15189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 821.376041][T15189] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 821.394599][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 821.402833][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 821.443585][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 821.452550][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 821.468833][T15189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 821.494405][T15189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 821.531753][T15189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 821.542521][T15189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 821.558134][T15189] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 821.569037][T15189] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 821.581752][T15189] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 821.592779][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 821.602325][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 821.616230][T15189] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 821.626451][T15189] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 821.636054][T15189] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 821.645090][T15189] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 821.834297][T15234] Bluetooth: hci4: command 0x0419 tx timeout [ 822.234446][T15234] Bluetooth: hci1: command 0x041b tx timeout [ 822.585064][ T9] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 822.715842][T15414] syz-executor.5 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 822.746234][ T9] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 822.765192][T15414] CPU: 1 PID: 15414 Comm: syz-executor.5 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 822.775317][T15414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 822.785407][T15414] Call Trace: [ 822.788701][T15414] [ 822.791643][T15414] dump_stack_lvl+0xcd/0x134 [ 822.796257][T15414] dump_header+0x10b/0x7f9 [ 822.800702][T15414] oom_kill_process.cold+0x10/0x15 [ 822.805839][T15414] out_of_memory+0x358/0x14a0 [ 822.810547][T15414] ? oom_killer_disable+0x270/0x270 [ 822.815769][T15414] ? io_schedule_timeout+0x140/0x140 [ 822.821079][T15414] mem_cgroup_out_of_memory+0x206/0x270 [ 822.826643][T15414] ? mem_cgroup_margin+0x130/0x130 [ 822.831811][T15414] memory_max_write+0x2f5/0x3c0 [ 822.836722][T15414] ? mem_cgroup_force_empty_write+0x150/0x150 [ 822.842843][T15414] ? lock_release+0x780/0x780 [ 822.848417][T15414] cgroup_file_write+0x1de/0x770 [ 822.853401][T15414] ? mem_cgroup_force_empty_write+0x150/0x150 [ 822.859518][T15414] ? kill_css+0x370/0x370 [ 822.863874][T15414] ? __phys_addr+0xc4/0x140 [ 822.868447][T15414] ? kill_css+0x370/0x370 [ 822.872803][T15414] kernfs_fop_write_iter+0x3f8/0x610 [ 822.878137][T15414] vfs_write+0x9e9/0xdd0 [ 822.882410][T15414] ? kernel_write+0x630/0x630 [ 822.887119][T15414] ? __fget_files+0x26a/0x440 [ 822.891854][T15414] ksys_write+0x127/0x250 [ 822.896214][T15414] ? __ia32_sys_read+0xb0/0xb0 [ 822.901026][T15414] ? syscall_enter_from_user_mode+0x2c/0xb0 [ 822.906949][T15414] do_syscall_64+0x35/0xb0 [ 822.911395][T15414] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 822.917323][T15414] RIP: 0033:0x7fa07d48b5a9 [ 822.921760][T15414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 822.941401][T15414] RSP: 002b:00007fa07e20a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 822.949839][T15414] RAX: ffffffffffffffda RBX: 00007fa07d5abf80 RCX: 00007fa07d48b5a9 [ 822.957829][T15414] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 822.965821][T15414] RBP: 00007fa07d4e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 822.973810][T15414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 822.981788][T15414] R13: 00007ffd36a3e96f R14: 00007fa07e20a300 R15: 0000000000022000 [ 822.989797][T15414] [ 823.074122][T15293] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 823.084178][T15293] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 823.085102][T15414] memory: usage 10696kB, limit 0kB, failcnt 206 [ 823.103040][T15293] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 823.131906][T15414] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 823.140923][ T9] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 823.165127][T15414] Memory cgroup stats for /syz5: [ 823.165361][T15414] anon 118784 [ 823.165361][T15414] file 10461184 [ 823.165361][T15414] kernel 270336 [ 823.165361][T15414] kernel_stack 32768 [ 823.165361][T15414] pagetables 81920 [ 823.165361][T15414] percpu 0 [ 823.165361][T15414] sock 0 [ 823.165361][T15414] vmalloc 0 [ 823.165361][T15414] shmem 10452992 [ 823.165361][T15414] zswap 0 [ 823.165361][T15414] zswapped 0 [ 823.165361][T15414] file_mapped 331776 [ 823.165361][T15414] file_dirty 4096 [ 823.165361][T15414] file_writeback 0 [ 823.165361][T15414] swapcached 0 [ 823.165361][T15414] anon_thp 0 [ 823.165361][T15414] file_thp 0 [ 823.165361][T15414] shmem_thp 0 [ 823.165361][T15414] inactive_anon 118784 [ 823.165361][T15414] active_anon 10452992 [ 823.165361][T15414] inactive_file 4096 [ 823.165361][T15414] active_file 4096 [ 823.165361][T15414] unevictable 0 [ 823.165361][T15414] slab_reclaimable 53632 [ 823.165361][T15414] slab_unreclaimable 72704 [ 823.165361][T15414] slab 126336 [ 823.267550][T15293] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 823.376168][T15414] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=15189,uid=0 [ 823.394087][T15414] Memory cgroup out of memory: Killed process 15189 (syz-executor.5) total-vm:50560kB, anon-rss:440kB, file-rss:8320kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 823.430786][T15293] 8021q: adding VLAN 0 to HW filter on device bond0 [ 823.572099][T15293] 8021q: adding VLAN 0 to HW filter on device team0 [ 823.621487][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 823.636849][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.661689][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 823.677695][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 823.690260][ T3672] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.697428][ T3672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.713574][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 823.722703][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.738129][ T3672] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.745291][ T3672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.797094][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 823.805959][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 823.816439][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 823.835853][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 823.846164][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 823.855262][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 823.864114][ T7167] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 823.881941][T15293] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network 11:21:21 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x30004081) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100400000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xffffffffffff2d71) close(r0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x5, 0x1, 0x5, 0x1f, 0x0, 0x200000000, 0x1004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x10, 0x7ff, 0x4b59f0d1, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x1f}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)='blkio.bfq.empty_time\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x40020002}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 [ 826.458706][T15506] dump_stack_lvl+0xcd/0x134 [ 826.463333][T15506] dump_header+0x10b/0x7f9 [ 826.467786][T15506] oom_kill_process.cold+0x10/0x15 [ 826.472941][T15506] out_of_memory+0x358/0x14a0 [ 826.477665][T15506] ? oom_killer_disable+0x270/0x270 [ 826.482899][T15506] ? mark_held_locks+0x9f/0xe0 [ 826.487692][T15506] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 826.493907][T15506] mem_cgroup_out_of_memory+0x206/0x270 [ 826.499491][T15506] ? mem_cgroup_margin+0x130/0x130 [ 826.504657][T15506] ? _raw_spin_unlock_irqrestore+0x38/0x70 [ 826.510515][T15506] memory_max_write+0x2f5/0x3c0 [ 826.515407][T15506] ? mem_cgroup_force_empty_write+0x150/0x150 [ 826.521515][T15506] ? lock_release+0x780/0x780 [ 826.526231][T15506] cgroup_file_write+0x1de/0x770 [ 826.531204][T15506] ? mem_cgroup_force_empty_write+0x150/0x150 [ 826.537302][T15506] ? kill_css+0x370/0x370 [ 826.541648][T15506] ? __phys_addr+0xc4/0x140 [ 826.546186][T15506] ? kill_css+0x370/0x370 [ 826.550530][T15506] kernfs_fop_write_iter+0x3f8/0x610 [ 826.555853][T15506] vfs_write+0x9e9/0xdd0 [ 826.560124][T15506] ? kernel_write+0x630/0x630 [ 826.564826][T15506] ? __fget_files+0x26a/0x440 [ 826.569536][T15506] ksys_write+0x127/0x250 [ 826.573887][T15506] ? __ia32_sys_read+0xb0/0xb0 [ 826.578672][T15506] ? syscall_enter_from_user_mode+0x22/0xb0 [ 826.584596][T15506] do_syscall_64+0x35/0xb0 [ 826.589041][T15506] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 826.594955][T15506] RIP: 0033:0x7f18b8a8b5a9 [ 826.599381][T15506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 826.619005][T15506] RSP: 002b:00007f18b9797168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 826.627430][T15506] RAX: ffffffffffffffda RBX: 00007f18b8babf80 RCX: 00007f18b8a8b5a9 [ 826.635410][T15506] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 826.643388][T15506] RBP: 00007f18b8ae67b0 R08: 0000000000000000 R09: 0000000000000000 [ 826.651365][T15506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 826.659342][T15506] R13: 00007ffe847c398f R14: 00007f18b9797300 R15: 0000000000022000 [ 826.667340][T15506] [ 826.686423][T15506] memory: usage 10636kB, limit 0kB, failcnt 73 [ 826.704900][T15506] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 826.733522][T15506] Memory cgroup stats for /syz3: [ 826.740520][T15234] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 826.760105][T15234] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 826.768512][T15234] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 826.776318][T15506] anon 114688 [ 826.776318][T15506] file 10452992 [ 826.776318][T15506] kernel 311296 [ 826.776318][T15506] kernel_stack 65536 [ 826.776318][T15506] pagetables 77824 [ 826.776318][T15506] percpu 144 [ 826.776318][T15506] sock 0 [ 826.776318][T15506] vmalloc 4096 [ 826.776318][T15506] shmem 10452992 [ 826.776318][T15506] zswap 0 [ 826.776318][T15506] zswapped 0 [ 826.776318][T15506] file_mapped 331776 [ 826.776318][T15506] file_dirty 0 [ 826.776318][T15506] file_writeback 0 [ 826.776318][T15506] swapcached 0 [ 826.776318][T15506] anon_thp 0 [ 826.776318][T15506] file_thp 0 [ 826.776318][T15506] shmem_thp 0 [ 826.776318][T15506] inactive_anon 114688 [ 826.776318][T15506] active_anon 10452992 [ 826.776318][T15506] inactive_file 0 [ 826.776318][T15506] active_file 0 [ 826.776318][T15506] unevictable 0 [ 826.776318][T15506] slab_reclaimable 55192 [ 826.776318][T15506] slab_unreclaimable 79752 [ 826.776318][T15506] slab 134944 [ 826.875449][T15234] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 826.885090][T15234] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 826.892502][T15234] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 826.910431][T15501] Bluetooth: hci3: HCI_REQ-0x0c1a [ 827.064501][T15506] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz3,mems_allowed=0-1,oom_memcg=/syz3,task_memcg=/syz3,task=syz-executor.3,pid=15293,uid=0 [ 827.110191][T15506] Memory cgroup out of memory: Killed process 15293 (syz-executor.3) total-vm:50560kB, anon-rss:444kB, file-rss:8320kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 827.212433][T15501] chnl_net:caif_netlink_parms(): no params data found [ 827.432427][T15501] bridge0: port 1(bridge_slave_0) entered blocking state [ 827.442642][T15501] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.457323][T15501] device bridge_slave_0 entered promiscuous mode [ 827.466670][T15501] bridge0: port 2(bridge_slave_1) entered blocking state [ 827.473878][T15501] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.482324][T15501] device bridge_slave_1 entered promiscuous mode [ 827.511628][T15501] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 827.524076][T15501] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 827.556348][T15501] team0: Port device team_slave_0 added [ 827.567332][T15501] team0: Port device team_slave_1 added [ 827.591735][T15501] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 827.599278][T15501] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 827.627725][T15501] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 827.646061][T15501] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 827.653036][T15501] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 827.688615][T15501] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 827.780575][T15501] device hsr_slave_0 entered promiscuous mode [ 827.795185][T15501] device hsr_slave_1 entered promiscuous mode [ 828.411917][ T9] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.526686][T15501] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 828.537961][T15501] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 828.554006][T15501] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 828.565231][T15501] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 828.688665][T15501] 8021q: adding VLAN 0 to HW filter on device bond0 [ 828.726126][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 828.733991][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 828.746505][T15501] 8021q: adding VLAN 0 to HW filter on device team0 [ 828.757876][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 828.768193][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 828.777326][T12818] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.784455][T12818] bridge0: port 1(bridge_slave_0) entered forwarding state [ 828.823104][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 828.832080][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 828.842340][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 828.851172][T12817] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.858324][T12817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 828.866866][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 828.876838][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 828.897353][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 828.907215][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 828.916381][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 828.925773][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 828.944643][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 828.953126][T12818] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 828.961507][ T3641] Bluetooth: hci3: command 0x0409 tx timeout [ 828.990337][T15501] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 829.006973][T15501] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 829.027069][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 829.035781][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 829.044473][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 829.310471][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 829.318970][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 829.337423][T15501] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 829.395107][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 829.403894][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 829.435206][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 829.443640][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 829.453637][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 829.461961][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 829.472733][T15501] device veth0_vlan entered promiscuous mode [ 829.500389][T15501] device veth1_vlan entered promiscuous mode [ 829.551775][T15501] device veth0_macvtap entered promiscuous mode [ 829.585398][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 829.593626][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 829.603367][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 829.612335][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 829.624824][T15501] device veth1_macvtap entered promiscuous mode [ 829.655752][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 829.663887][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 829.678729][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.714267][T15501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.724125][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.754999][T15501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.766599][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.784752][T15501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.800096][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 829.813012][T15501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.830305][T15501] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 829.852390][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 829.868189][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 829.881939][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 11:21:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd99eea7960717142fa9ea4318123741c4a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ce99fbfbf9b0a4def23d410f6296b32a334388107200759cda9036b4e369a9e152ddcc7f05a5f3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c3b35967deabe802f5ab3e89bd6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ececb0cd2b6d357b85a0218ce740068725837074e098ee207d2f73902fbcfcf49822775985bf32d715f5888b24efa000000000000ffffffdf000000000000000000000089a7b9b00000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf449c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f292324b7ab7f91a31cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b544035a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf1128744bab6677fcb78e313841ec309baed0495f06d058a75fa4c81e5c9f42d9383e41d277b10392a912ffaf6f658f3fadd16286744f839c3f128f8f92d0992239eafce5c1b3f97a297c9e49a0c3510ef74080e6d1e0c8a868a353409e34d3e82279637598f37ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cef5379da860aed8477dfa8ceefb405005c6977c78cdbf37704ec73755539280b064bda154910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06cd58b61799257ab55ff413c86ba9affb12ec757c7234c270246c87a901160e6c07bc6cf8809c3a0d46ff7f008000000000ad1e1f493354b2822b98371d000000167d78e65b90eba0768e825972ea3b774a1467c89fa0f82e8440105051e5510a33dcda5e143fbfff161c12ca389cbe4c51b3fa00675cd1b66c5fd9c26a54d43fa050645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a84a4e3344b155cc20f49e298727340e97cdefb40e56e9cfad973347d0de7ba4754ff231a1b033d8f931ba3442b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2ef79b8d4c2ff030000000000000007b82e6044f643068cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c99220002af8c5e53d52c83ac3fa7c3a3ee6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991a225c120a3c950942fe0bc9f2a1a7506d35e5b439edeb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c9eed00000000ab6648a9dea0b6c91996d65da6c24a702a86c814459f3cdaaf99000000000000000000bfb32c826563c518d0ad23bc83ba3f3757210a057eff7615c868bd7d74233da1a3b56d4e04a7ec4792b1c4cffddbbdcfdd23ab5268f1b3d08ebb8ce498cbaaf5aaab812201d1aba3d70471fcd9b466569f3ef72f39d87fcccab514fc02b70be8629c9b73ce7bc4be7f8be71cb7b2d0a4acff8f6abe7dbad64dfa44966945d93c33b038ce0d890f851811e387723a25dda119f64b35e71c5400000000000000000000000000000034c751ebdf3f20a95b817ea3df3d6c0002a41783058e56c70afe8016b3dd9dc7785b36e609f173cc6b893ecd138289709839747837d6a6283b3452c57a5d44cacd363589845637071320921d22c1663964eddec902fc7cc33158bc306d8c3bdae8108a23d2dc96a5cdb518f58832ec0906aaec43659c79c8ad37b0f961f3beaa3e02f7762c5dd633d13b5e487e996597b2ab42c81eb7dd8390e13b395aacce4683e55bcfe8c17615257364365fd48bd77da79e52ce9adfe6dca9c42c4d719347f39ef006c2df747ee6adb7cd04faf05c36de72354c64ebaf28a3de18607ebc4b70f50f71dae565749568a23319232dc213342fb472e98c9a412199ce7976bee5eaf40e60cb3fbe8b92dae5008e92d17d05ce74ffffe74ae71d5b8bd43a4e0bf0390335aa489689f5e3a4ac5adca96caab658b43cd499d95d3876c220d147ad1d0e626621d88f1370982f663793cac52ea0d14e595ff1f56427a0a813bb3b84d31d021eeea8faeff25bb66f5940d08a5509a66fc43962bcb2f7415bc38e355e80ec935aa6fe2d74bd475d89449fb46320fee40faff2fd005549fe6a042bd95decfde5e166971935f4cfd9c9e5bfd2d803644f4e5b7e6dc1a7a35df7134e2fad79269bf24bea4eb0213068e3054d9e4a8d1a9eb032cb390e2016d0ce10549728cb4732dc5adab16fa19ac70780b29e079be27c95d3dd2bd91a584c46d84d430fc6ea31ce0ba62fa27be9f6bc435203da7c3a5d68bf4dd4f81cbfaa1c87a15b9272853c9837db930952dca667194b71815a9eb49b495360dcdf31e0e560857d0541a916d6b5469ac1b36babc5a91e1d58925f20d9d5f8a0da3c30711b0d101cabceffbe072be69613ea0003c6e9bb5cd2413c8ddc17cfa319cf7aae"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="14000000340005ab115f33dea3686a0d0235fc60", 0x14}], 0x1}, 0x0) 11:21:27 executing program 4: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x30004081) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100400000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xffffffffffff2d71) close(r0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x5, 0x1, 0x5, 0x1f, 0x0, 0x200000000, 0x1004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x10, 0x7ff, 0x4b59f0d1, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x1f}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)='blkio.bfq.empty_time\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x40020002}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000200), 0x2e8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) [ 829.961124][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 829.976344][T15501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 829.993953][T15501] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 11:21:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="14000000340005ab115f33dea3686a0d0235fc60", 0x14}], 0x1}, 0x0) [ 830.012675][T15501] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 830.066739][T15501] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 830.075906][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 830.095676][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 11:21:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000940)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff5070000000000000200000000000c00095000000000000002ba728041598d6fbd30cb599e83d24a3aa81d36bb3019c13bd2321afb56fa54f26fb0b71d0e6adfefcf1d8f7faf75e0f226bd99eea7960717142fa9ea4318123741c4a0e168c1886d0d4d94f2f4e345c652fbc16ee988e6e0dc8cedf3ce99fbfbf9b0a4def23d410f6296b32a334388107200759cda9036b4e369a9e152ddcc7f05a5f3c4744aeaccd3641110bec4e9027a0c8055bbfc3a96d2e8910c2c3b35967deabe802f5ab3e89bd6c662ed4048d3b3e22278d00031e5388ee5c867ddd58211d6ececb0cd2b6d357b85a0218ce740068725837074e098ee207d2f73902fbcfcf49822775985bf32d715f5888b24efa000000000000ffffffdf000000000000000000000089a7b9b00000000000000000000000000000b27cf3d1848a54d7132be1ffb0adf9deab29ea3323aa9fdfb52faf449c3bfd09000000b91ab219efdebb7b3de8f67581cf796a1d4223b9ff7ffcad3f6c962b9f292324b7ab7f91a31cf41ab11f12fb1e0a494034127de7c6592df1a6c64d8f20a67745409e011f1264d43e153b3d34899f40159e800ea2474b544035a30b23bcee46762c2093bcc9eae5ee3e980026c96f80ee1a74e04bde740750fa4d9aaa705989b8e673e3296e52d337c56abf1128744bab6677fcb78e313841ec309baed0495f06d058a75fa4c81e5c9f42d9383e41d277b10392a912ffaf6f658f3fadd16286744f839c3f128f8f92d0992239eafce5c1b3f97a297c9e49a0c3510ef74080e6d1e0c8a868a353409e34d3e82279637598f37ad380a447483cac394c7bbdcd0e3b1c39b6e00916de48a4e70f03cc4146a77af02c1d4cef5379da860aed8477dfa8ceefb405005c6977c78cdbf37704ec73755539280b064bda154910fe050038ec9e47de89298b7bf4d769ccc18eede00e8ca5457870eb30d211e23ccc8e06cd58b61799257ab55ff413c86ba9affb12ec757c7234c270246c87a901160e6c07bc6cf8809c3a0d46ff7f008000000000ad1e1f493354b2822b98371d000000167d78e65b90eba0768e825972ea3b774a1467c89fa0f82e8440105051e5510a33dcda5e143fbfff161c12ca389cbe4c51b3fa00675cd1b66c5fd9c26a54d43fa050645bd9109b7e7131421c0f39113be7664e08bdd7115c61afcb718cf3c4680b2f6c7a84a4e3344b155cc20f49e298727340e97cdefb40e56e9cfad973347d0de7ba4754ff231a1b033d8f931ba3442b2c7c503f3d0e7ab0e958adb862822e40009995ae166deb9856291a43a6f7eb2e32cefbf46306f2ef79b8d4c2ff030000000000000007b82e6044f643068cd47ae636a5dbe9864a117d27326850a7c3b570863f532c218b10af13d7be94987005088a83880ccab9c99220002af8c5e53d52c83ac3fa7c3a3ee6c08384865b66d2b4dcb5dd9cba16b64ebbbf8702ae12c77e6e34991a225c120a3c950942fe0bc9f2a1a7506d35e5b439edeb7088aeda890cf8a4a6f31ba6d9b8cb098f935bdcbb29fd0f1a342c9eed00000000ab6648a9dea0b6c91996d65da6c24a702a86c814459f3cdaaf99000000000000000000bfb32c826563c518d0ad23bc83ba3f3757210a057eff7615c868bd7d74233da1a3b56d4e04a7ec4792b1c4cffddbbdcfdd23ab5268f1b3d08ebb8ce498cbaaf5aaab812201d1aba3d70471fcd9b466569f3ef72f39d87fcccab514fc02b70be8629c9b73ce7bc4be7f8be71cb7b2d0a4acff8f6abe7dbad64dfa44966945d93c33b038ce0d890f851811e387723a25dda119f64b35e71c5400000000000000000000000000000034c751ebdf3f20a95b817ea3df3d6c0002a41783058e56c70afe8016b3dd9dc7785b36e609f173cc6b893ecd138289709839747837d6a6283b3452c57a5d44cacd363589845637071320921d22c1663964eddec902fc7cc33158bc306d8c3bdae8108a23d2dc96a5cdb518f58832ec0906aaec43659c79c8ad37b0f961f3beaa3e02f7762c5dd633d13b5e487e996597b2ab42c81eb7dd8390e13b395aacce4683e55bcfe8c17615257364365fd48bd77da79e52ce9adfe6dca9c42c4d719347f39ef006c2df747ee6adb7cd04faf05c36de72354c64ebaf28a3de18607ebc4b70f50f71dae565749568a23319232dc213342fb472e98c9a412199ce7976bee5eaf40e60cb3fbe8b92dae5008e92d17d05ce74ffffe74ae71d5b8bd43a4e0bf0390335aa489689f5e3a4ac5adca96caab658b43cd499d95d3876c220d147ad1d0e626621d88f1370982f663793cac52ea0d14e595ff1f56427a0a813bb3b84d31d021eeea8faeff25bb66f5940d08a5509a66fc43962bcb2f7415bc38e355e80ec935aa6fe2d74bd475d89449fb46320fee40faff2fd005549fe6a042bd95decfde5e166971935f4cfd9c9e5bfd2d803644f4e5b7e6dc1a7a35df7134e2fad79269bf24bea4eb0213068e3054d9e4a8d1a9eb032cb390e2016d0ce10549728cb4732dc5adab16fa19ac70780b29e079be27c95d3dd2bd91a584c46d84d430fc6ea31ce0ba62fa27be9f6bc435203da7c3a5d68bf4dd4f81cbfaa1c87a15b9272853c9837db930952dca667194b71815a9eb49b495360dcdf31e0e560857d0541a916d6b5469ac1b36babc5a91e1d58925f20d9d5f8a0da3c30711b0d101cabceffbe072be69613ea0003c6e9bb5cd2413c8ddc17cfa319cf7aae"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x29}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="14000000340005ab115f33dea3686a0d0235fc60", 0x14}], 0x1}, 0x0) [ 830.265390][T15501] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.274166][T15501] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.309520][T15501] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 830.355570][T15501] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 11:21:28 executing program 0: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x30004081) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100400000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xffffffffffff2d71) close(r0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x5, 0x1, 0x5, 0x1f, 0x0, 0x200000000, 0x1004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x10, 0x7ff, 0x4b59f0d1, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x1f}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)='blkio.bfq.empty_time\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x40020002}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 1 [ 833.773205][ T9] device veth1_vlan left promiscuous mode [ 833.782326][T15233] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 833.792885][ T9] device veth0_vlan left promiscuous mode [ 833.799209][T12956] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 833.807702][T12956] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 833.815364][T12956] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 833.822625][T12956] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 833.830716][ T9] device veth1_macvtap left promiscuous mode [ 833.838337][T15650] Bluetooth: hci4: HCI_REQ-0x0c1a [ 833.853752][ T9] device veth0_macvtap left promiscuous mode [ 833.861947][ T9] device veth1_vlan left promiscuous mode [ 833.871051][ T9] device veth0_vlan left promiscuous mode [ 834.132475][ T9] team0 (unregistering): Port device team_slave_1 removed [ 834.145134][ T9] team0 (unregistering): Port device team_slave_0 removed [ 834.159213][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 834.172072][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 834.232904][ T9] bond0 (unregistering): Released all slaves [ 834.354936][ T9] team0 (unregistering): Port device team_slave_1 removed [ 834.369339][ T9] team0 (unregistering): Port device team_slave_0 removed [ 834.381343][ T9] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 834.399349][ T9] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 834.468912][ T9] bond0 (unregistering): Released all slaves [ 834.719121][T15650] chnl_net:caif_netlink_parms(): no params data found [ 834.805456][T15650] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.812648][T15650] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.820939][T15650] device bridge_slave_0 entered promiscuous mode [ 834.829631][T15650] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.837647][T15650] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.846047][T15650] device bridge_slave_1 entered promiscuous mode [ 834.880773][T15650] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 834.893676][T15650] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 834.943592][T15650] team0: Port device team_slave_0 added [ 834.952648][T15650] team0: Port device team_slave_1 added [ 834.998948][T15650] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 835.031086][T15650] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 835.067839][T15650] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 835.083514][T15650] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 835.097475][T15650] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 835.123783][T15650] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 835.184960][T15650] device hsr_slave_0 entered promiscuous mode [ 835.191832][T15650] device hsr_slave_1 entered promiscuous mode [ 835.199573][T15650] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 835.207350][T15234] Bluetooth: hci3: command 0x0419 tx timeout [ 835.207774][T15650] Cannot create hsr debugfs directory [ 835.435047][ T3641] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 835.924777][ T3641] Bluetooth: hci4: command 0x0409 tx timeout [ 836.004315][T12956] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 836.269857][T15650] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 836.285024][T15650] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 836.316827][T15650] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 836.357600][T15650] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 836.539637][T15650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 836.569348][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 836.578634][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 836.595395][T15650] 8021q: adding VLAN 0 to HW filter on device team0 [ 836.607703][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 836.617029][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 836.626544][ T3711] bridge0: port 1(bridge_slave_0) entered blocking state [ 836.633647][ T3711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 836.670881][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 836.682421][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 836.697594][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 836.709147][ T2878] bridge0: port 2(bridge_slave_1) entered blocking state [ 836.716301][ T2878] bridge0: port 2(bridge_slave_1) entered forwarding state [ 836.727598][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 836.746366][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 836.760390][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 836.771121][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 836.780569][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 836.790410][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 836.809786][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 836.817967][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 836.826792][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 836.835763][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 836.844149][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 836.857216][T15650] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 837.154916][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 837.162676][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 837.200557][T15650] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 837.526348][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 837.546511][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 837.605726][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 837.614081][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 837.630004][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 837.644999][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 837.661269][T15650] device veth0_vlan entered promiscuous mode [ 837.680514][T15650] device veth1_vlan entered promiscuous mode [ 837.735468][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 837.744087][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 837.763447][T15650] device veth0_macvtap entered promiscuous mode [ 837.786087][T15650] device veth1_macvtap entered promiscuous mode [ 837.825697][T15650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 837.854288][T15650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.864145][T15650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 837.875179][T15650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.885342][T15650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 837.896201][T15650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.907942][T15650] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 837.923625][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 837.933022][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 837.941608][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 837.950785][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 837.961032][T15650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 837.980353][T15650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 837.991021][T15650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 838.004440][T12956] Bluetooth: hci4: command 0x041b tx timeout [ 838.011966][T15650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.024101][T15650] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 838.035825][T15650] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 838.047357][T15650] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 838.057896][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 838.067704][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 838.079249][T15650] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 838.090678][T15650] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 838.100822][T15650] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 838.110227][T15650] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 838.408374][T12956] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 838.416864][T12956] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 838.430199][T12956] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 838.438759][T12956] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 838.447193][T12956] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 838.459748][T12956] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 838.468346][T15772] Bluetooth: hci1: HCI_REQ-0x0c1a [ 838.642547][T15772] chnl_net:caif_netlink_parms(): no params data found [ 838.712920][T15772] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.721330][T15772] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.729948][T15772] device bridge_slave_0 entered promiscuous mode [ 838.747679][T15772] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.755371][T15772] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.763090][T15772] device bridge_slave_1 entered promiscuous mode [ 838.793668][T15772] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 838.809451][T15772] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 838.851696][T15772] team0: Port device team_slave_0 added [ 838.869386][T15772] team0: Port device team_slave_1 added [ 838.915680][T15772] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 838.922665][T15772] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 838.956108][T15772] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 838.973167][T15772] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 838.981430][T15772] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 839.008635][T15772] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 839.053223][T15772] device hsr_slave_0 entered promiscuous mode [ 839.063019][T15772] device hsr_slave_1 entered promiscuous mode [ 839.073335][T15772] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 839.081303][T15772] Cannot create hsr debugfs directory [ 839.573018][T15772] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 839.589499][T15772] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 839.602813][T15772] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 839.613197][T15772] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 839.639608][T15772] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.646764][T15772] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.654179][T15772] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.661341][T15772] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.675574][ T3711] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.683722][ T3711] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.748326][T15772] 8021q: adding VLAN 0 to HW filter on device bond0 [ 839.765978][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 839.773839][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 839.786275][T15772] 8021q: adding VLAN 0 to HW filter on device team0 [ 839.811416][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 839.820690][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 839.836478][ T3672] bridge0: port 1(bridge_slave_0) entered blocking state [ 839.843607][ T3672] bridge0: port 1(bridge_slave_0) entered forwarding state [ 839.870235][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 839.882199][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 839.895300][ T3672] bridge0: port 2(bridge_slave_1) entered blocking state [ 839.902408][ T3672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 839.917068][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 839.959035][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 839.975616][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 839.985321][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 839.993971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 840.003284][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 840.012196][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 840.020976][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 840.029849][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 840.038729][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 840.048466][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 840.058795][T15772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 840.074750][T15234] Bluetooth: hci4: command 0x040f tx timeout [ 840.209475][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 840.220289][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 840.238755][T15772] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 840.481456][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 840.490632][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 840.512315][T15772] device veth0_vlan entered promiscuous mode [ 840.526517][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 840.540594][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 840.554895][T15234] Bluetooth: hci1: command 0x0409 tx timeout [ 840.561358][T15772] device veth1_vlan entered promiscuous mode [ 840.570020][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 840.583695][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 840.593374][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 840.626317][T15772] device veth0_macvtap entered promiscuous mode [ 840.641526][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 840.650514][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 840.666641][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 840.682392][T15772] device veth1_macvtap entered promiscuous mode [ 840.691245][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 840.706475][ T3672] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 840.729823][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 840.741449][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.751829][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 840.763461][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.773447][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 840.790413][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.806518][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 840.823372][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.835677][T15772] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 840.844456][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 840.861074][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 840.872062][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 840.892570][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.903025][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 840.922037][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.932390][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 840.949462][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 840.960920][ T3641] Bluetooth: hci5: Opcode 0x c03 failed: -110 [ 840.994336][T15772] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 841.029999][T15772] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 841.042220][T15772] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 841.054446][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 841.063180][ T2878] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 841.077902][T15772] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.093713][T15772] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.114402][ T3641] Bluetooth: hci0: command 0x0406 tx timeout [ 841.139487][T15772] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.150098][T15772] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 11:21:39 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) 11:21:39 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) 11:21:39 executing program 4: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x30004081) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100400000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xffffffffffff2d71) close(r0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x5, 0x1, 0x5, 0x1f, 0x0, 0x200000000, 0x1004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x10, 0x7ff, 0x4b59f0d1, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x1f}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)='blkio.bfq.empty_time\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x40020002}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc5 1 [ 843.699948][T15234] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 843.708169][T15234] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 843.724049][T15234] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 843.731962][T15234] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 843.739519][T15234] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 843.748318][T15980] Bluetooth: hci5: HCI_REQ-0x0c1a [ 843.932385][T15980] chnl_net:caif_netlink_parms(): no params data found [ 843.993876][T15980] bridge0: port 1(bridge_slave_0) entered blocking state [ 844.001634][T15980] bridge0: port 1(bridge_slave_0) entered disabled state [ 844.009944][T15980] device bridge_slave_0 entered promiscuous mode [ 844.018787][T15980] bridge0: port 2(bridge_slave_1) entered blocking state [ 844.026043][T15980] bridge0: port 2(bridge_slave_1) entered disabled state [ 844.034851][T15980] device bridge_slave_1 entered promiscuous mode [ 844.062699][T15980] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 844.076391][T15980] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 844.113875][T15980] team0: Port device team_slave_0 added [ 844.122704][T15980] team0: Port device team_slave_1 added [ 844.152154][T15980] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 844.160716][T15980] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 844.187669][T15980] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 844.200433][T15980] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 844.208418][T15980] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 844.234536][T15980] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 844.289443][T15980] device hsr_slave_0 entered promiscuous mode [ 844.296463][T15980] device hsr_slave_1 entered promiscuous mode [ 844.302888][T15980] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 844.316805][T15980] Cannot create hsr debugfs directory [ 844.724501][ T3641] Bluetooth: hci1: command 0x040f tx timeout [ 844.918331][T15980] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 844.928223][T15980] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 844.939793][T15980] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 844.949608][T15980] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 845.057672][T15980] 8021q: adding VLAN 0 to HW filter on device bond0 [ 845.071231][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 845.080398][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 845.092062][T15980] 8021q: adding VLAN 0 to HW filter on device team0 [ 845.106812][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 845.116179][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 845.126810][ T3711] bridge0: port 1(bridge_slave_0) entered blocking state [ 845.133906][ T3711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 845.164983][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 845.173060][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 845.183111][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 845.192170][ T3675] bridge0: port 2(bridge_slave_1) entered blocking state [ 845.199340][ T3675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 845.210729][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 845.220157][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 845.229503][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 845.239432][ T3675] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 845.262009][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 845.270747][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 845.280886][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 845.298909][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 845.307613][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 845.316628][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 845.325527][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 845.337216][T15980] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 845.511287][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 845.524001][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 845.543627][T15980] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 845.569796][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 845.580981][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 845.613043][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 845.622028][T11790] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 845.643334][T15980] device veth0_vlan entered promiscuous mode [ 845.651860][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 845.660221][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 845.681992][T15980] device veth1_vlan entered promiscuous mode [ 845.722225][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 845.739743][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 845.751880][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 845.766777][ T6831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 845.783489][T15980] device veth0_macvtap entered promiscuous mode [ 845.799117][T15980] device veth1_macvtap entered promiscuous mode [ 845.827444][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 845.844391][ T3641] Bluetooth: hci5: command 0x0409 tx timeout [ 845.853494][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 845.863414][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 845.874038][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 845.883950][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 845.894621][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 845.909643][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 845.922565][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 845.932583][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 845.943436][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 845.956002][T15980] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 845.970564][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 845.979540][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 845.987819][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 846.005090][T12817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 846.016942][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 846.031000][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 846.041930][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 846.057885][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 846.068082][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 846.079496][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 846.089755][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 846.100525][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 846.124250][T15980] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 846.141472][T15980] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 846.153243][T15980] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 846.163125][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 846.172821][ T3711] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 846.184871][T15980] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.193610][T15980] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.215861][T15980] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.225024][T15980] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 11:21:43 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b46cf1da1b96dbb895c000000007e2e299e5e868a2c93b82330a6fab908000000912b2b9c326f8af5e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e802b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb239a2645114f6b3b9d4213b57a3c2973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf2f7532177f0686079a76404f94943569d33b648d5cabc996fbe49d0cddfb0e06560bf56f338ae1b4c8dfe3c60f0baa1960460ac4675e1e66db2bbbfd8513558fea85416d5ab4c72cae0d3181547eeab7ea44a4bdb7a444795f798ff9f4e7be75c804e01467f8ffd494c159e1db857d38cdfce34211ab786b58e1ca764b1769d012cdcc972e2eca01a951147348cb15130708258429a26e18fa8b57d9249702cb23a4aaad81cfdbfa5ca603313ac3a82dae68635064b17b949efa41b5f246258bb95af42ec9f7f68161f6c8a5aa45da89a8924040bbf16cdaec847d1aa3ae808ae62587fe04d9e0fa5f18e0e50b5748177ec9dfe98b1dbb48687b4f5c00000fd116d22ef9ed9a3957017087ba0c8836f1ec3e512671375897195ec9ab5783f200a2e41a8b61c813e7e58e498649d68f29252b9d3d21d6ae0a86ac9c3d93630b0c65bcc59c62496fec7ea7d089f76bebcb1bf4b9cc013cb273f65239688527589917c8f385a4ee62486ccd8ca3611b6e150c098396082889f7fd88ab93c44824fb106b9adbf615ee5c3a412f14f618f864fa455d4e7ef6a20f6e790f79125459a0fa5b78a2faeb9f2353f65db1a7ce29fe54d65c1aa24086c7b365159bcca85b3ffc5273858222562cfe7b4b9cf7978265a830f8d8eab626d87a04f60156aa63ff010000006450b4ec95e332017c5cca0534be032c8bc1aede66aee93ee9f2e020a2479b21e1b887f7ff6d6a61cc1409881c38829e410bf5c7ad5df5c60a3c15f4d2e5c0ba7c84dcf962b7bbbae9f1cc90ae324eb656bc8f08d2000ad6b2867283f0215d0a06c9a8d58941b4a6d903de7f027792e75a406a3287ba2e527041c595c9d19360f8dfa27afb31825f6c2d295b23895dd74ac53d0000000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000200), 0x2e8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) 11:21:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) 11:21:43 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x3508020000000005) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) getpid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x20b000) 11:21:43 executing program 2: openat$cgroup_pressure(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x30004081) r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0xce7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x100400000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000140)=0xffffffffffff2d71) close(r0) perf_event_open(&(0x7f0000000a80)={0x4, 0x80, 0x5, 0x1, 0x5, 0x1f, 0x0, 0x200000000, 0x1004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000380), 0xc}, 0x10, 0x7ff, 0x4b59f0d1, 0x0, 0x7, 0x0, 0x1ff, 0x0, 0x1f}, 0x0, 0x0, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000340)='blkio.bfq.empty_time\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000025c0), 0x0, 0x0, 0x0, 0x40020002}, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a0, &(0x7f0000000b40)='vo\x0f\x96o8%d\xa1\xe3\xd7\\b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x03\x1f \'Y\x17]\tc\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x10\x80w\xd2|D\xaaK\x14]x\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\f\xb4\x03\x02\x0e|\x00\x0f\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xbaUn\x04\'%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\r\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) [ 846.806870][ T3641] Bluetooth: hci1: command 0x0419 tx timeout 11:21:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000200), 0x2e8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140), 0x10) 11:21:44 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b46cf1da1b96dbb895c000000007e2e299e5e868a2c93b82330a6fab908000000912b2b9c326f8af5e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e802b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb239a2645114f6b3b9d4213b57a3c2973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf2f7532177f0686079a76404f94943569d33b648d5cabc996fbe49d0cddfb0e06560bf56f338ae1b4c8dfe3c60f0baa1960460ac4675e1e66db2bbbfd8513558fea85416d5ab4c72cae0d3181547eeab7ea44a4bdb7a444795f798ff9f4e7be75c804e01467f8ffd494c159e1db857d38cdfce34211ab786b58e1ca764b1769d012cdcc972e2eca01a951147348cb15130708258429a26e18fa8b57d9249702cb23a4aaad81cfdbfa5ca603313ac3a82dae68635064b17b949efa41b5f246258bb95af42ec9f7f68161f6c8a5aa45da89a8924040bbf16cdaec847d1aa3ae808ae62587fe04d9e0fa5f18e0e50b5748177ec9dfe98b1dbb48687b4f5c00000fd116d22ef9ed9a3957017087ba0c8836f1ec3e512671375897195ec9ab5783f200a2e41a8b61c813e7e58e498649d68f29252b9d3d21d6ae0a86ac9c3d93630b0c65bcc59c62496fec7ea7d089f76bebcb1bf4b9cc013cb273f65239688527589917c8f385a4ee62486ccd8ca3611b6e150c098396082889f7fd88ab93c44824fb106b9adbf615ee5c3a412f14f618f864fa455d4e7ef6a20f6e790f79125459a0fa5b78a2faeb9f2353f65db1a7ce29fe54d65c1aa24086c7b365159bcca85b3ffc5273858222562cfe7b4b9cf7978265a830f8d8eab626d87a04f60156aa63ff010000006450b4ec95e332017c5cca0534be032c8bc1aede66aee93ee9f2e020a2479b21e1b887f7ff6d6a61cc1409881c38829e410bf5c7ad5df5c60a3c15f4d2e5c0ba7c84dcf962b7bbbae9f1cc90ae324eb656bc8f08d2000ad6b2867283f0215d0a06c9a8d58941b4a6d903de7f027792e75a406a3287ba2e527041c595c9d19360f8dfa27afb31825f6c2d295b23895dd74ac53d0000000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:44 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a01380b46cf1da1b96dbb895c000000007e2e299e5e868a2c93b82330a6fab908000000912b2b9c326f8af5e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0fdc6892ed01fdde50ba180e802b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb239a2645114f6b3b9d4213b57a3c2973347080ccfb8d8a930f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf2f7532177f0686079a76404f94943569d33b648d5cabc996fbe49d0cddfb0e06560bf56f338ae1b4c8dfe3c60f0baa1960460ac4675e1e66db2bbbfd8513558fea85416d5ab4c72cae0d3181547eeab7ea44a4bdb7a444795f798ff9f4e7be75c804e01467f8ffd494c159e1db857d38cdfce34211ab786b58e1ca764b1769d012cdcc972e2eca01a951147348cb15130708258429a26e18fa8b57d9249702cb23a4aaad81cfdbfa5ca603313ac3a82dae68635064b17b949efa41b5f246258bb95af42ec9f7f68161f6c8a5aa45da89a8924040bbf16cdaec847d1aa3ae808ae62587fe04d9e0fa5f18e0e50b5748177ec9dfe98b1dbb48687b4f5c00000fd116d22ef9ed9a3957017087ba0c8836f1ec3e512671375897195ec9ab5783f200a2e41a8b61c813e7e58e498649d68f29252b9d3d21d6ae0a86ac9c3d93630b0c65bcc59c62496fec7ea7d089f76bebcb1bf4b9cc013cb273f65239688527589917c8f385a4ee62486ccd8ca3611b6e150c098396082889f7fd88ab93c44824fb106b9adbf615ee5c3a412f14f618f864fa455d4e7ef6a20f6e790f79125459a0fa5b78a2faeb9f2353f65db1a7ce29fe54d65c1aa24086c7b365159bcca85b3ffc5273858222562cfe7b4b9cf7978265a830f8d8eab626d87a04f60156aa63ff010000006450b4ec95e332017c5cca0534be032c8bc1aede66aee93ee9f2e020a2479b21e1b887f7ff6d6a61cc1409881c38829e410bf5c7ad5df5c60a3c15f4d2e5c0ba7c84dcf962b7bbbae9f1cc90ae324eb656bc8f08d2000ad6b2867283f0215d0a06c9a8d58941b4a6d903de7f027792e75a406a3287ba2e527041c595c9d19360f8dfa27afb31825f6c2d295b23895dd74ac53d0000000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:44 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="14000000000000000000000001000000030000000000000014000000000000000000000001000000700800000000000011000000000000000000000001000000ff00000000000000110000000000000000000000010000000300000000000000140000000000000000000000010000000180000000000000880000000000000000000000070000004414707000000006000000080000000700000003863c0000000305081d14c1ab832d020a42f5fc0c2e1b4d93050f2048d1bcfaf753a746eaaf379f000e951d7583f5ef45ae293d2bbd07075ccf14626544287a60000000000000af0f000080010000000700001000000007ff0000000600000005000000081400000000000000000000000100000020960000000000001400000000000000000000000100000000000080000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:44 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="14000000000000000000000001000000030000000000000014000000000000000000000001000000700800000000000011000000000000000000000001000000ff00000000000000110000000000000000000000010000000300000000000000140000000000000000000000010000000180000000000000880000000000000000000000070000004414707000000006000000080000000700000003863c0000000305081d14c1ab832d020a42f5fc0c2e1b4d93050f2048d1bcfaf753a746eaaf379f000e951d7583f5ef45ae293d2bbd07075ccf14626544287a60000000000000af0f000080010000000700001000000007ff0000000600000005000000081400000000000000000000000100000020960000000000001400000000000000000000000100000000000080000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, 0x0, &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r1}, 0x10) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:44 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000900)="2e00000020000503d25a80768c4f940d0124fc6010003566000002070800f00337153e370600080000000000d1bd", 0x2e}], 0x1}, 0x0) 11:21:45 executing program 5: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:45 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:45 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:45 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000900)="2e00000020000503d25a80768c4f940d0124fc6010003566000002070800f00337153e370600080000000000d1bd", 0x2e}], 0x1}, 0x0) [ 847.916358][ T3641] Bluetooth: hci5: command 0x041b tx timeout 11:21:45 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0)) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='track_foreign_dirty\x00'}, 0x10) syz_clone(0x2aaa1006, 0x0, 0x8a470004, &(0x7f0000000380), 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x81, 0xfa, 0x4, 0xfe, 0x0, 0x2, 0xb4400, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x613e, 0x3f}, 0x100, 0x38b, 0x48, 0x0, 0x100, 0x953, 0x401, 0x0, 0x80000000, 0x0, 0x800}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 11:21:45 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x58, 0x10, &(0x7f0000000040)}, 0x24) 11:21:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, 0x0, &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r1}, 0x10) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:45 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:45 executing program 3: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x401}, 0x0, 0x0, 0x0, 0x9, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000380), 0x5}, 0x808c, 0x100000000, 0x2a, 0x7, 0x0, 0x1, 0x4, 0x0, 0x9, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000003c0)=0x4) close(r0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xa, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0x3}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40086607, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0xe8030000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') sendmsg$inet(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000340)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000780)=[{0x0}, {&(0x7f0000000400)="662e99c2924060c0b6f5856148aff764186ca330c797cd3c775c7ad00cd560f003e64f0d7e1223539d4b89ad600b803c5d81260c5a986a640693", 0x3a}, {&(0x7f0000000640)="2c6cb27c429af8ec8b15f0ab945b201b331ac204b3f7", 0x16}, {&(0x7f0000000680)="5d69b488fb0801e57ed75ad436467ad482017508623561b707956ec352f511caab2ab9b875496f8a70000e9f521334b739e9f5371323d2e57d1a34ebd13384439a9907cc684d932b1a19b13fa0c8c0c14ed8", 0x52}], 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="00000000e000000200000000111d7f0000000000000000000100"/36], 0x168}, 0x1) socketpair(0x25, 0x6, 0xfffffff7, &(0x7f0000000280)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) 11:21:45 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000900)="2e00000020000503d25a80768c4f940d0124fc6010003566000002070800f00337153e370600080000000000d1bd", 0x2e}], 0x1}, 0x0) 11:21:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x5, &(0x7f00000000c0), 0x4) 11:21:46 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x800c6613, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x800c6613, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x0, 0x7f, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x18320, r1, 0x0, &(0x7f0000000280)=[r3, 0x1]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa22fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x3f000000, 0x7bc03) 11:21:46 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x3, &(0x7f0000000080)=[{&(0x7f0000000900)="2e00000020000503d25a80768c4f940d0124fc6010003566000002070800f00337153e370600080000000000d1bd", 0x2e}], 0x1}, 0x0) 11:21:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x5, &(0x7f00000000c0), 0x4) 11:21:46 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0)) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='track_foreign_dirty\x00'}, 0x10) syz_clone(0x2aaa1006, 0x0, 0x8a470004, &(0x7f0000000380), 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x81, 0xfa, 0x4, 0xfe, 0x0, 0x2, 0xb4400, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x613e, 0x3f}, 0x100, 0x38b, 0x48, 0x0, 0x100, 0x953, 0x401, 0x0, 0x80000000, 0x0, 0x800}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 11:21:46 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x58, 0x10, &(0x7f0000000040)}, 0x24) 11:21:46 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x5, &(0x7f00000000c0), 0x4) 11:21:46 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) 11:21:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, 0x0, &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r1}, 0x10) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:47 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x5, &(0x7f00000000c0), 0x4) 11:21:47 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x800c6613, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x800c6613, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x0, 0x7f, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x18320, r1, 0x0, &(0x7f0000000280)=[r3, 0x1]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa22fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x3f000000, 0x7bc03) 11:21:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:47 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000be045770e4b07ae038cb3be5f7ef000012cc19280a01380b46cf1da1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab908000000912b2b9c326f8af5e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0e5c6892ed01fdde50b81000000b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23882645114f6b3b9d4213b57a342973347080ccfb8d8a130f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf2f7532177f0686079a76404f94943569d33b648d5cabc996fbe49d0cddfb0e06560bf56f338ae1b4c8dfe3c60f0b60460ac4675e1e66db2bbbfd8513558fea85416d5ab4c72cbc0d3181547eeab7ea44a4bdb7a444795f"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) [ 849.994658][ T3641] Bluetooth: hci5: command 0x040f tx timeout 11:21:47 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x800c6613, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x800c6613, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x0, 0x7f, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x18320, r1, 0x0, &(0x7f0000000280)=[r3, 0x1]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa22fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x3f000000, 0x7bc03) 11:21:47 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) 11:21:47 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x58, 0x10, &(0x7f0000000040)}, 0x24) 11:21:48 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0)) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='track_foreign_dirty\x00'}, 0x10) syz_clone(0x2aaa1006, 0x0, 0x8a470004, &(0x7f0000000380), 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x81, 0xfa, 0x4, 0xfe, 0x0, 0x2, 0xb4400, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x613e, 0x3f}, 0x100, 0x38b, 0x48, 0x0, 0x100, 0x953, 0x401, 0x0, 0x80000000, 0x0, 0x800}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) 11:21:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00'}, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, 0x0, &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r1}, 0x10) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:48 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000be045770e4b07ae038cb3be5f7ef000012cc19280a01380b46cf1da1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab908000000912b2b9c326f8af5e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0e5c6892ed01fdde50b81000000b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23882645114f6b3b9d4213b57a342973347080ccfb8d8a130f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf2f7532177f0686079a76404f94943569d33b648d5cabc996fbe49d0cddfb0e06560bf56f338ae1b4c8dfe3c60f0b60460ac4675e1e66db2bbbfd8513558fea85416d5ab4c72cbc0d3181547eeab7ea44a4bdb7a444795f"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) 11:21:48 executing program 3: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x800c6613, &(0x7f0000000040)) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x800c6613, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) openat$cgroup_subtree(r2, &(0x7f0000000180), 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x800c6613, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x0, 0x7f, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0xa, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x18320, r1, 0x0, &(0x7f0000000280)=[r3, 0x1]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa22fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x3f000000, 0x7bc03) 11:21:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:49 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x58, 0x10, &(0x7f0000000040)}, 0x24) 11:21:49 executing program 5: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0)) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='track_foreign_dirty\x00'}, 0x10) syz_clone(0x2aaa1006, 0x0, 0x8a470004, &(0x7f0000000380), 0x0, 0x0) getpid() bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x81, 0xfa, 0x4, 0xfe, 0x0, 0x2, 0xb4400, 0xc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x613e, 0x3f}, 0x100, 0x38b, 0x48, 0x0, 0x100, 0x953, 0x401, 0x0, 0x80000000, 0x0, 0x800}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000480)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) [ 852.074367][ T3641] Bluetooth: hci5: command 0x0419 tx timeout 11:21:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:50 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:50 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) 11:21:50 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) 11:21:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:50 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x45, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x11, &(0x7f0000000c00)=ANY=[@ANYBLOB="2124000020ffd675cfbd8a1a8d5ced4e", @ANYRES32, @ANYBLOB="0000000000040000185000000a00000000000000000000009500000000000000182300002cd48a2e1c6d935e6b44ffaa12950647b71276e3758004728c50f41823ba1628d3029bf8d3afacf9df7bc188c3a43982f431991e6ce32b1b787a492e8bd2b6a098ec5f8b172074d7bbe6", @ANYRES32, @ANYBLOB="00000000ff03", @ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000008500000087000000183200000500"/32], &(0x7f0000000200)='syzkaller\x00', 0x0, 0xb5, &(0x7f0000000740)=""/181, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000a80)={0x3, 0x2}, 0x10}, 0x80) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000400)={[{0x2d, 'cpuset'}]}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x11, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x0, 0x1, 0x3, 0x6, 0xa, 0x50, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x8, 0x3, 0x0, 0x18, 0x4}, @ldst={0x2, 0x3, 0x0, 0x2, 0x9, 0x8, 0xffffffffffffffe0}, @ldst={0x0, 0x2, 0x0, 0xa, 0x9, 0x2, 0x8}, @alu={0x4, 0x0, 0x1, 0x8, 0x8, 0x4, 0xfffffffffffffff0}, @generic={0xff, 0x1, 0x4, 0x60, 0x100}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x89, &(0x7f0000000cc0)=""/137, 0x40f00, 0xe, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x1, 0xc, 0x83, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000700)=[0xffffffffffffffff, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(r2, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001c00)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x2, 0x9, 0x5, 0x0, 0x400, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={r1, 0x0, 0x0}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x18, 0x3, &(0x7f0000000e00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000be045770e4b07ae038cb3be5f7ef000012cc19280a01380b46cf1da1b96dbb895c000000007e2e299e5a868a2c93b82330a6fab908000000912b2b9c326f8af5e837e85559448b689fb549252e5fba00ac459ebc2e606df21feaa75ec5419c426e744676ce082947384476151eafe83fb3ba69f79cb713d0e5c6892ed01fdde50b81000000b8c9febf9fdb97bef0bde9a5198be5c32bc6b82fbc64fb23882645114f6b3b9d4213b57a342973347080ccfb8d8a130f1facaed5551336d4b50015d3c236dd6f0fe9e2285bc2acf581d7e263bff90aaf2f7532177f0686079a76404f94943569d33b648d5cabc996fbe49d0cddfb0e06560bf56f338ae1b4c8dfe3c60f0b60460ac4675e1e66db2bbbfd8513558fea85416d5ab4c72cbc0d3181547eeab7ea44a4bdb7a444795f"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xa, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000c502020000000000010000009500000000000000"], &(0x7f0000000580)='GPL\x00', 0x0, 0x96, &(0x7f00000005c0)=""/150, 0x40f00, 0xc, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0x3, 0x403}, 0x10, 0xffffffffffffffff, r4}, 0x80) 11:21:50 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xf3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0506617, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380), 0x10, 0x0, 0x0, 0x0, &(0x7f0000000880)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r1, 0x7}, 0xc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305839, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1d, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000800000001800000007000000000000000200000018100000", @ANYRES32=r0, @ANYBLOB="000000b90000009500000000000000950000000000000000"], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x12, '\x00', r3, 0x1d, r2, 0x8, &(0x7f0000000640)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x0, 0x5, 0x7, 0x8000}, 0x10, 0x0, r4}, 0x80) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) 11:21:51 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 11:21:51 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:21:52 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:52 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 11:21:52 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:21:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1b9, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x1aa3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) socketpair(0xa, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x81, 0x0, 0x7, 0x8, 0x0, 0x0, 0x10014, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e69, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0xeb9e, 0x7fff, 0x60, 0x0, 0x6, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x3a) 11:21:52 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:21:52 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:21:52 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 11:21:52 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:21:52 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:21:52 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 11:21:53 executing program 1: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:21:53 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:21:53 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:21:53 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:21:53 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:21:59 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:21:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1b9, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x1aa3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) socketpair(0xa, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x81, 0x0, 0x7, 0x8, 0x0, 0x0, 0x10014, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e69, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0xeb9e, 0x7fff, 0x60, 0x0, 0x6, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="2d704d6473202daeb54090a23184676574ff002089dbadc84e2d80656df7ffffffffffffff69636573202d726c696d6974202b68756765746c62202d637075616363742050dd2f9e77179a6abdc74e0a70f59be938258d095ece77e0f2c1498b50c6ce4eb58039be91a21f8a1aed460ae92b5f5bb81e116f8fee13963e910300b30628390113a5070000000000000001004d03465cc597ee225a2cdf75cd91adb26face01acc125b670f26f0de3b0e826a5dc9c2bb26a5b64a2607441f760f192bb5a61bb63acbc672c20535d05b28105d051ae0579ce78a58d8e12100000008c6cdcfde9d1b2c9c8fe7dbecb130f47a294966f821022436536b4571a7c3069faf721f73a91856c57e2536c6d0f50361f578ead87617ce0050e014e816a08732b42dc460d7c007420a730a21edc84079c2a6ee40bd3a26a9f2c5ff27599ea7e225ebc83af696fd32156c5a620c22510588f78e9dafb4285dedb280fe4fa5aedc0ba98f46be0a7b4f99fa19fab75c6d602479f578354f9337cb5fe51245eea6ec427fd593c8c61767735290e59a0380bd50917ecdce173dbbd097e9b86cc1b8e5ee8b344d883f3e0807a2c27a01007c2f1a8f92da0000000000000000006ad3c30000002100000e12564f2b4bdd98419b5f54a4700138ff3cd0800b4a28426821d5d333f3f5084aecc140eaf3439f13fba5dc0e8daab4afa7193dbdc758e22d2cea0310ae79d1dce35fabcdadc76f25fa55361ac8db51f6a21acaf36a3eb7586400add6751896f8c2a78490ae716d9110c1619748d8f3dda310408cfa693b342e68622551140000000000004ad13e0ee6f232298f75ce2bad5ef2e13a5291050900000000000000db1ed0a729c8a08a7544f3247f30a50e7a5fe6acec1c85d8947230bd37521ddf532713e24b4e32202af9f49aa89a94caf724c6dedf61f4e9565889ab7b00000000"], 0x3a) 11:21:59 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:21:59 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:22:00 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:22:00 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000006e000000000000001800000003000000000000000000000095000000000000009500fff400000000688ceff2ac558b0988eea10245719785aad6090141a60f296358a20bf76058b06a2a31182975990686232de27ff24ec31c7de319815572160b3d56efbc5ff9be7d7dd4515ca146b9882a016097ea4f65b3add7482769c0862ca4374f47f22717aa05c07466a95b8a24f71c287628e5ed2901f5a912d07bd9abfd2715ecfcdac0332013d21dd55dd3a96c7e18edb3bbd505199c78b69e9b03f8fd9507433f9b35473e85d70d198af844b84d5a6ddaa2eef20c851c73139ebf5a34402e71ee7cd4203521ebefaa69519913b3487bea4786aac03300d683bc38bfc59083eb27288a1ccb28ad09ac780e9a067a4a174c6133e13551899bb14c5eaad10adcfd5821f123b75dfd17a41d64b139635d423a26386d80e188bbf0de1d1781e7a6f75fd8aacffc6ba207ea6500"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:00 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1b9, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x1aa3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) socketpair(0xa, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x81, 0x0, 0x7, 0x8, 0x0, 0x0, 0x10014, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e69, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0xeb9e, 0x7fff, 0x60, 0x0, 0x6, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x3a) 11:22:00 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 11:22:01 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:01 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:01 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000006e000000000000001800000003000000000000000000000095000000000000009500fff400000000688ceff2ac558b0988eea10245719785aad6090141a60f296358a20bf76058b06a2a31182975990686232de27ff24ec31c7de319815572160b3d56efbc5ff9be7d7dd4515ca146b9882a016097ea4f65b3add7482769c0862ca4374f47f22717aa05c07466a95b8a24f71c287628e5ed2901f5a912d07bd9abfd2715ecfcdac0332013d21dd55dd3a96c7e18edb3bbd505199c78b69e9b03f8fd9507433f9b35473e85d70d198af844b84d5a6ddaa2eef20c851c73139ebf5a34402e71ee7cd4203521ebefaa69519913b3487bea4786aac03300d683bc38bfc59083eb27288a1ccb28ad09ac780e9a067a4a174c6133e13551899bb14c5eaad10adcfd5821f123b75dfd17a41d64b139635d423a26386d80e188bbf0de1d1781e7a6f75fd8aacffc6ba207ea6500"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:01 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:02 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:02 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:05 executing program 4: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:22:05 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:05 executing program 2: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:22:05 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) [ 869.765798][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.772139][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 11:22:07 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1b9, 0x0, 0x0, 0x5}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x1aa3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) socketpair(0xa, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x81, 0x0, 0x7, 0x8, 0x0, 0x0, 0x10014, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3e69, 0x4, @perf_bp={&(0x7f00000001c0), 0x5}, 0xeb9e, 0x7fff, 0x60, 0x0, 0x6, 0xffffffff, 0x0, 0x0, 0x3, 0x0, 0x9}, 0x0, 0xf, 0xffffffffffffffff, 0x2) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x3a) 11:22:07 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x0, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000020000000000000ea20850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0xe0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0), 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000f40), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) r2 = syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x8, 0x0, 0x3f, 0x6, 0x0, 0x4, 0x820, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000001c0), 0x6}, 0x11841, 0x7f, 0x0, 0x4, 0xffffffff, 0x1, 0x0, 0x0, 0x7, 0x0, 0x80000000}, r2, 0x8, r0, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) 11:22:07 executing program 0: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:07 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:07 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="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"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:07 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:22:08 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:22:08 executing program 5: socket$kcm(0x10, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x182e) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x2, 0x0, 0x0, 0x0, 0x8c, &(0x7f0000000c80)=""/140, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x7, 0xfffff000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f00000008c0)=ANY=[@ANYBLOB="18080000000000850000000000000000851000000600000018100000", @ANYRES32=r1, @ANYBLOB="00000000000000006e000000000000001800000003000000000000000000000095000000000000009500fff400000000688ceff2ac558b0988eea10245719785aad6090141a60f296358a20bf76058b06a2a31182975990686232de27ff24ec31c7de319815572160b3d56efbc5ff9be7d7dd4515ca146b9882a016097ea4f65b3add7482769c0862ca4374f47f22717aa05c07466a95b8a24f71c287628e5ed2901f5a912d07bd9abfd2715ecfcdac0332013d21dd55dd3a96c7e18edb3bbd505199c78b69e9b03f8fd9507433f9b35473e85d70d198af844b84d5a6ddaa2eef20c851c73139ebf5a34402e71ee7cd4203521ebefaa69519913b3487bea4786aac03300d683bc38bfc59083eb27288a1ccb28ad09ac780e9a067a4a174c6133e13551899bb14c5eaad10adcfd5821f123b75dfd17a41d64b139635d423a26386d80e188bbf0de1d1781e7a6f75fd8aacffc6ba207ea6500"/353], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) r3 = socket$kcm(0x21, 0x2, 0x2) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000880)=0x20) write$cgroup_int(r4, &(0x7f0000000200), 0x43400) r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x1f, 0x3c, 0x0, 0x0, 0x3, 0x42000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000280), 0x1}, 0xa000, 0x800, 0x8, 0x0, 0x5acf, 0x0, 0x81, 0x0, 0x1}, r5, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r5, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x3, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={&(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @private}}, 0x80, 0x0, 0x0, &(0x7f00000000c0)=[{0x18, 0x110, 0x1, "dc"}], 0x18}, 0x0) 11:22:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x120c, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x400000004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, [@generic={0x40, 0x3, 0x9, 0x2}, @generic={0x7, 0xf, 0x5, 0x2, 0x3}, @exit, @map_idx={0x18, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000140)={0x0, 0x0, 0x26c4, 0x6}, 0x10}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, r0, 0x0) syz_clone(0x74809480, 0x0, 0x1ffff000, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 11:22:10 executing program 0: r0 = socket$kcm(0x2, 0x5, 0x84) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000000), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000f40)=[{&(0x7f0000000140)='v', 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000f80)=""/4096, 0x1000}], 0x1}, 0x0) 11:22:10 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="180000000000000000000000000000009500d9000000000012cc19280a9c380b46cf1da1b96dbb0268e57a230bb8233000fab90800000091e682a8e7aec8197db4a360b99afc0d93eb379b341a877b9d7d119b57c8a4503864d9e475ff5885e1be7c6aa11807ee0e53d67bd0ece69e463a752ef6af4f46b805d2ce0e887bef96616cef6322e11203c3e79861e79d50bbde0af5cd4a2d26d22713ccfb7c7de109645e9d9b966cd6e1614ad2709168cb544679ea22b37bbc3ba2c2a4f50ba89e5da1232f36d3e5f6da5777484657cbe5c2c95b4a73e606bb13b4718bb9911e9b0794896ea31cc80a68043bb254321f4890436f6d542f4cc6f266dbe1323f7948c1406ff578d38470858e84d1caf0f9cff1031af7bf62a713cb5cdb0fb3a18a1ce778539dd45c2991227e5d5f7e8afd282adc6df33c618a9d52f987e8091e89dbf7bf63ea195ba2ce8a24231eb9df8b0a395b24e41a57328d6ea818fa1e85f6d6f33444e5958cbeb879048e0c9b06a9cff28332ce9186b7b8626b1d2b2506eff79eaeed53aa66ead82bbe9cd86b6c240c71cdb324f5b525ee6e8a5e14c8099588a07b993710d2ecbd9fdddb9068d4fff9b15cabb925a57c81385a2641efc113b914a89dcbcf7b4215a2"], &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240), 0x1b}, 0x40200, 0x100000001, 0x6, 0x0, 0x8, 0xf4, 0x0, 0x0, 0x40, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x3) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000140)='cgroup.controllers\x00'}, 0x30) getpid() 11:22:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x0, 0x0, &(0x7f0000000100)) 11:22:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x0, 0x0, &(0x7f0000000100)) 11:22:10 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='memory.low\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) syz_clone(0x74809480, 0x0, 0x4100, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRESOCT], 0x32600) write$cgroup_int(r1, &(0x7f0000000300), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x8) 11:22:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0xd, &(0x7f0000000a80)=@raw=[@map_fd={0x18, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x5}, @exit, @initr0, @ldst={0x3, 0x0, 0x1, 0x0, 0x8, 0x50, 0x4}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000b80)='GPL\x00', 0x4, 0xa6, &(0x7f0000000bc0)=""/166, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c80)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000cc0)={0x3, 0xc, 0x3, 0x10001}, 0x10}, 0x80) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000d80)={0xffffffffffffffff, 0xd70, 0x4}, 0xc) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b00)=@bpf_ext={0x1c, 0x9, &(0x7f00000007c0)=@raw=[@exit, @map_val={0x18, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x1000f}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xf}, @call={0x85, 0x0, 0x0, 0x78}], 0x0, 0x9, 0x9d, &(0x7f0000000840)=""/157, 0x40f00, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x8}, 0x8, 0x10, &(0x7f0000000a00)={0x2, 0xe, 0x770d, 0x80000000}, 0x10, 0x11f98, 0xffffffffffffffff, 0x0, &(0x7f0000000dc0)=[0x1, 0x1, r0, 0xffffffffffffffff]}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='freezer.self_freezing\x00', 0x7a05, 0x1700) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x19, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="14550200100000004d1a97f48e7c24c315950d3409200010000700852001002500000085100005000000000000000800000051e0748c331a2b138bd26ca0040553023f73adbdcfa45167ea28d15bccd7ace7d5af0d283d3e1b237df8d50800000000000000c948d3c612d2a1f3090000000000da71082ed328b57796809e6169e80c15487b80"], &(0x7f0000000440)='syzkaller\x00', 0xffff, 0x1f, &(0x7f0000000480)=""/31, 0x40f00, 0x8, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x1, 0x5, 0x0, 0x8001}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=[r1]}, 0x80) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x7, 0x5, 0xe, 0x0, 0x0, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x7fffffffffffffff, 0x2}, 0x40451, 0x0, 0xb3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x10001}, 0x0, 0x4, 0xffffffffffffffff, 0x2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r3) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000003c0)='rpcgss_oid_to_mech\x00', r2}, 0x10) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x9a, 0xc1, 0x6, 0xff, 0x0, 0xfffffffffffffffd, 0xc0005, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x40000, 0x8, 0xffffffff, 0x8, 0x8000000000000001, 0x1, 0x0, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xf, r4, 0x7) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='*&-#\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000240)) 11:22:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:10 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x0, 0x0, &(0x7f0000000100)) 11:22:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:10 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x120c, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x400000004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, [@generic={0x40, 0x3, 0x9, 0x2}, @generic={0x7, 0xf, 0x5, 0x2, 0x3}, @exit, @map_idx={0x18, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000140)={0x0, 0x0, 0x26c4, 0x6}, 0x10}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, r0, 0x0) syz_clone(0x74809480, 0x0, 0x1ffff000, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 11:22:14 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240), 0x1b}, 0x40200, 0x100000001, 0x6, 0x0, 0x8, 0xf4, 0x0, 0x0, 0x40, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x3) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000140)='cgroup.controllers\x00'}, 0x30) getpid() 11:22:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x26, 0x0, 0x0, &(0x7f0000000100)) 11:22:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:14 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='memory.low\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) syz_clone(0x74809480, 0x0, 0x4100, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRESOCT], 0x32600) write$cgroup_int(r1, &(0x7f0000000300), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x8) 11:22:14 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240), 0x1b}, 0x40200, 0x100000001, 0x6, 0x0, 0x8, 0xf4, 0x0, 0x0, 0x40, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x3) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000140)='cgroup.controllers\x00'}, 0x30) getpid() 11:22:14 executing program 2: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x4, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000018c00)={0x11, 0x3, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000440)='GPL\x00', 0x4, 0xb0, &(0x7f0000000480)=""/176, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rcu_utilization\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000240), 0x1b}, 0x40200, 0x100000001, 0x6, 0x0, 0x8, 0xf4, 0x0, 0x0, 0x40, 0x0, 0x4}, 0x0, 0x4, 0xffffffffffffffff, 0x3) syz_clone(0x74809480, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r2 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r2, 0xffffffffffffffff, 0x0, 0x13, &(0x7f0000000140)='cgroup.controllers\x00'}, 0x30) getpid() 11:22:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) [ 878.044079][T16556] nfsd: failed to allocate reply cache 11:22:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 11:22:15 executing program 4: perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) openat$cgroup_int(r0, &(0x7f0000000140)='memory.low\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) syz_clone(0x74809480, 0x0, 0x4100, &(0x7f0000000000), 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRESOCT], 0x32600) write$cgroup_int(r1, &(0x7f0000000300), 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x8) 11:22:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x120c, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x9, 0x0, 0x0, 0x0, 0x400000004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000006c0)='cpuset.memory_pressure_enabled\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xa, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, [@generic={0x40, 0x3, 0x9, 0x2}, @generic={0x7, 0xf, 0x5, 0x2, 0x3}, @exit, @map_idx={0x18, 0x1}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x1000, &(0x7f00000005c0)=""/4096, 0x40f00, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000140)={0x0, 0x0, 0x26c4, 0x6}, 0x10}, 0x80) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x4, r0, 0x0) syz_clone(0x74809480, 0x0, 0x1ffff000, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) [ 882.793064][T16558] ================================================================== [ 882.801180][T16558] BUG: KASAN: use-after-free in __list_del_entry_valid+0xf2/0x110 [ 882.809076][T16558] Read of size 8 at addr ffff8880624ca5c8 by task syz-executor.1/16558 [ 882.817329][T16558] [ 882.819659][T16558] CPU: 0 PID: 16558 Comm: syz-executor.1 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 882.829740][T16558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 882.839804][T16558] Call Trace: [ 882.843100][T16558] [ 882.846040][T16558] dump_stack_lvl+0xcd/0x134 [ 882.850658][T16558] print_report.cold+0x2ba/0x719 [ 882.855640][T16558] ? __list_del_entry_valid+0xf2/0x110 [ 882.861116][T16558] kasan_report+0xb1/0x1e0 [ 882.865562][T16558] ? __list_del_entry_valid+0xf2/0x110 [ 882.871042][T16558] __list_del_entry_valid+0xf2/0x110 [ 882.876347][T16558] unregister_shrinker+0x83/0x2f0 [ 882.881396][T16558] nfsd_reply_cache_shutdown+0x22/0x280 [ 882.886960][T16558] nfsd_exit_net+0x110/0x4c0 [ 882.891575][T16558] ? write_maxblksize+0x560/0x560 [ 882.896626][T16558] ops_exit_list+0xb0/0x170 [ 882.901179][T16558] setup_net+0x7fb/0xc50 [ 882.905443][T16558] ? ops_init+0x470/0x470 [ 882.909796][T16558] copy_net_ns+0x318/0x760 [ 882.914233][T16558] create_new_namespaces+0x3f6/0xb20 [ 882.919541][T16558] copy_namespaces+0x391/0x450 [ 882.924326][T16558] copy_process+0x304d/0x7090 [ 882.929019][T16558] ? lock_chain_count+0x20/0x20 [ 882.933882][T16558] ? __cleanup_sighand+0xb0/0xb0 [ 882.938829][T16558] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 882.945010][T16558] kernel_clone+0xe7/0xab0 [ 882.949440][T16558] ? lock_downgrade+0x6e0/0x6e0 [ 882.954302][T16558] ? create_io_thread+0xe0/0xe0 [ 882.959166][T16558] ? find_held_lock+0x2d/0x110 [ 882.963957][T16558] __do_sys_clone+0xba/0x100 [ 882.968560][T16558] ? kernel_clone+0xab0/0xab0 [ 882.973258][T16558] ? syscall_enter_from_user_mode+0x2c/0xb0 [ 882.979171][T16558] do_syscall_64+0x35/0xb0 [ 882.983611][T16558] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 882.989524][T16558] RIP: 0033:0x7fd2e928b5a9 [ 882.993941][T16558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 883.013557][T16558] RSP: 002b:00007fd2ea071118 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 883.021975][T16558] RAX: ffffffffffffffda RBX: 00007fd2e93abf80 RCX: 00007fd2e928b5a9 [ 883.029948][T16558] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000074809480 [ 883.037925][T16558] RBP: 00007fd2e92e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 883.045899][T16558] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 883.053872][T16558] R13: 00007ffea30fef4f R14: 00007fd2ea071300 R15: 0000000000022000 [ 883.061854][T16558] [ 883.064873][T16558] [ 883.067192][T16558] Allocated by task 16556: [ 883.071601][T16558] kasan_save_stack+0x1e/0x40 [ 883.076295][T16558] __kasan_kmalloc+0xa9/0xd0 [ 883.080893][T16558] ops_init+0xfb/0x470 [ 883.084982][T16558] setup_net+0x5d1/0xc50 [ 883.089242][T16558] copy_net_ns+0x318/0x760 [ 883.093688][T16558] create_new_namespaces+0x3f6/0xb20 [ 883.098988][T16558] copy_namespaces+0x391/0x450 [ 883.103759][T16558] copy_process+0x304d/0x7090 [ 883.108447][T16558] kernel_clone+0xe7/0xab0 [ 883.112873][T16558] __do_sys_clone+0xba/0x100 [ 883.117471][T16558] do_syscall_64+0x35/0xb0 [ 883.121906][T16558] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 883.127815][T16558] [ 883.130133][T16558] Freed by task 16556: [ 883.134195][T16558] kasan_save_stack+0x1e/0x40 [ 883.138890][T16558] kasan_set_track+0x21/0x30 [ 883.143496][T16558] kasan_set_free_info+0x20/0x30 [ 883.148453][T16558] ____kasan_slab_free+0x166/0x1c0 [ 883.153575][T16558] slab_free_freelist_hook+0x8b/0x1c0 [ 883.158953][T16558] kfree+0xe2/0x580 [ 883.162766][T16558] ops_init+0xcd/0x470 [ 883.166852][T16558] setup_net+0x5d1/0xc50 [ 883.171138][T16558] copy_net_ns+0x318/0x760 [ 883.175589][T16558] create_new_namespaces+0x3f6/0xb20 [ 883.180900][T16558] copy_namespaces+0x391/0x450 [ 883.185683][T16558] copy_process+0x304d/0x7090 [ 883.190371][T16558] kernel_clone+0xe7/0xab0 [ 883.194796][T16558] __do_sys_clone+0xba/0x100 [ 883.199397][T16558] do_syscall_64+0x35/0xb0 [ 883.203834][T16558] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 883.209753][T16558] [ 883.212073][T16558] Last potentially related work creation: [ 883.217786][T16558] kasan_save_stack+0x1e/0x40 [ 883.222478][T16558] __kasan_record_aux_stack+0xbe/0xd0 [ 883.227867][T16558] call_rcu+0x99/0x790 [ 883.231945][T16558] netlink_release+0xeff/0x1db0 [ 883.236818][T16558] sock_release+0x87/0x1b0 [ 883.241247][T16558] netlink_kernel_release+0x4b/0x60 [ 883.246450][T16558] ops_exit_list+0xb0/0x170 [ 883.250968][T16558] setup_net+0x7fb/0xc50 [ 883.255226][T16558] copy_net_ns+0x318/0x760 [ 883.259663][T16558] create_new_namespaces+0x3f6/0xb20 [ 883.264960][T16558] copy_namespaces+0x391/0x450 [ 883.269733][T16558] copy_process+0x304d/0x7090 [ 883.274420][T16558] kernel_clone+0xe7/0xab0 [ 883.278846][T16558] __do_sys_clone+0xba/0x100 [ 883.283443][T16558] do_syscall_64+0x35/0xb0 [ 883.287877][T16558] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 883.293786][T16558] [ 883.296105][T16558] The buggy address belongs to the object at ffff8880624ca000 [ 883.296105][T16558] which belongs to the cache kmalloc-2k of size 2048 [ 883.310160][T16558] The buggy address is located 1480 bytes inside of [ 883.310160][T16558] 2048-byte region [ffff8880624ca000, ffff8880624ca800) [ 883.323611][T16558] [ 883.325951][T16558] The buggy address belongs to the physical page: [ 883.332364][T16558] page:ffffea0001893200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x624c8 [ 883.342528][T16558] head:ffffea0001893200 order:3 compound_mapcount:0 compound_pincount:0 [ 883.350859][T16558] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 883.358856][T16558] raw: 00fff00000010200 dead000000000100 dead000000000122 ffff888011842000 [ 883.367449][T16558] raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000 [ 883.376031][T16558] page dumped because: kasan: bad access detected [ 883.382439][T16558] page_owner tracks the page as allocated [ 883.388147][T16558] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x1d20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC|__GFP_HARDWALL), pid 11618, tgid 11617 (syz-executor.0), ts 627435439129, free_ts 627401673840 [ 883.411461][T16558] get_page_from_freelist+0x109b/0x2ce0 [ 883.417041][T16558] __alloc_pages+0x1c7/0x510 [ 883.421665][T16558] alloc_pages+0x1a6/0x270 [ 883.426101][T16558] allocate_slab+0x27e/0x3d0 [ 883.430706][T16558] ___slab_alloc+0x84f/0xe80 [ 883.435312][T16558] __slab_alloc.constprop.0+0x4d/0xa0 [ 883.440699][T16558] kmem_cache_alloc_trace+0x323/0x3e0 [ 883.446090][T16558] do_check_common+0x24b/0xcc20 [ 883.450955][T16558] bpf_check+0x734c/0xac10 [ 883.455386][T16558] bpf_prog_load+0x13cb/0x2230 [ 883.460153][T16558] __sys_bpf+0x1605/0x4cf0 [ 883.464573][T16558] __x64_sys_bpf+0x75/0xb0 [ 883.468994][T16558] do_syscall_64+0x35/0xb0 [ 883.473428][T16558] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 883.479335][T16558] page last free stack trace: [ 883.484002][T16558] free_pcp_prepare+0x5e4/0xd20 [ 883.488867][T16558] free_unref_page+0x19/0x4d0 [ 883.493559][T16558] __unfreeze_partials+0x17c/0x1a0 [ 883.498677][T16558] qlist_free_all+0x6a/0x170 [ 883.503283][T16558] kasan_quarantine_reduce+0x180/0x200 [ 883.508761][T16558] __kasan_slab_alloc+0xa2/0xc0 [ 883.513628][T16558] kmem_cache_alloc+0x267/0x3b0 [ 883.518486][T16558] jbd2__journal_start+0x18c/0x910 [ 883.523618][T16558] __ext4_journal_start_sb+0x3a3/0x490 [ 883.529104][T16558] ext4_dirty_inode+0x9d/0x110 [ 883.533890][T16558] __mark_inode_dirty+0x48b/0x1040 [ 883.539006][T16558] generic_write_end+0x350/0x440 [ 883.543956][T16558] ext4_da_write_end+0x16e/0x9a0 [ 883.548914][T16558] generic_perform_write+0x306/0x560 [ 883.554259][T16558] ext4_buffered_write_iter+0x15b/0x460 [ 883.559815][T16558] ext4_file_write_iter+0x8b8/0x1740 [ 883.565110][T16558] [ 883.567431][T16558] Memory state around the buggy address: [ 883.573057][T16558] ffff8880624ca480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 883.581135][T16558] ffff8880624ca500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 883.589195][T16558] >ffff8880624ca580: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 883.597249][T16558] ^ [ 883.603655][T16558] ffff8880624ca600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 883.611715][T16558] ffff8880624ca680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 883.619777][T16558] ================================================================== [ 883.962830][T16558] Kernel panic - not syncing: panic_on_warn set ... [ 883.969465][T16558] CPU: 0 PID: 16558 Comm: syz-executor.1 Not tainted 6.0.0-syzkaller-02770-g79d878f7ad8e #0 [ 883.979552][T16558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 883.989622][T16558] Call Trace: [ 883.992910][T16558] [ 883.995849][T16558] dump_stack_lvl+0xcd/0x134 [ 884.000473][T16558] panic+0x2c8/0x627 [ 884.006760][T16558] ? panic_print_sys_info.part.0+0x10b/0x10b [ 884.012762][T16558] ? preempt_schedule_common+0x59/0xc0 [ 884.018242][T16558] ? preempt_schedule_thunk+0x16/0x18 [ 884.023650][T16558] ? __list_del_entry_valid+0xf2/0x110 [ 884.029127][T16558] end_report.part.0+0x3f/0x7c [ 884.033912][T16558] kasan_report.cold+0xa/0xf [ 884.038523][T16558] ? __list_del_entry_valid+0xf2/0x110 [ 884.044004][T16558] __list_del_entry_valid+0xf2/0x110 [ 884.049311][T16558] unregister_shrinker+0x83/0x2f0 [ 884.054366][T16558] nfsd_reply_cache_shutdown+0x22/0x280 [ 884.059942][T16558] nfsd_exit_net+0x110/0x4c0 [ 884.064566][T16558] ? write_maxblksize+0x560/0x560 [ 884.069628][T16558] ops_exit_list+0xb0/0x170 [ 884.074170][T16558] setup_net+0x7fb/0xc50 [ 884.078471][T16558] ? ops_init+0x470/0x470 [ 884.082840][T16558] copy_net_ns+0x318/0x760 [ 884.087295][T16558] create_new_namespaces+0x3f6/0xb20 [ 884.092613][T16558] copy_namespaces+0x391/0x450 [ 884.097405][T16558] copy_process+0x304d/0x7090 [ 884.102109][T16558] ? lock_chain_count+0x20/0x20 [ 884.106988][T16558] ? __cleanup_sighand+0xb0/0xb0 [ 884.111946][T16558] ? asm_sysvec_apic_timer_interrupt+0x16/0x20 [ 884.118145][T16558] kernel_clone+0xe7/0xab0 [ 884.122591][T16558] ? lock_downgrade+0x6e0/0x6e0 [ 884.127460][T16558] ? create_io_thread+0xe0/0xe0 [ 884.132328][T16558] ? find_held_lock+0x2d/0x110 [ 884.137104][T16558] __do_sys_clone+0xba/0x100 [ 884.141712][T16558] ? kernel_clone+0xab0/0xab0 [ 884.146381][T16558] ? syscall_enter_from_user_mode+0x2c/0xb0 [ 884.152266][T16558] do_syscall_64+0x35/0xb0 [ 884.156694][T16558] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 884.162617][T16558] RIP: 0033:0x7fd2e928b5a9 [ 884.167024][T16558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 884.186623][T16558] RSP: 002b:00007fd2ea071118 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 884.195035][T16558] RAX: ffffffffffffffda RBX: 00007fd2e93abf80 RCX: 00007fd2e928b5a9 [ 884.203027][T16558] RDX: 0000000020000040 RSI: 0000000000000000 RDI: 0000000074809480 [ 884.210995][T16558] RBP: 00007fd2e92e67b0 R08: 0000000000000000 R09: 0000000000000000 [ 884.218970][T16558] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 [ 884.226966][T16558] R13: 00007ffea30fef4f R14: 00007fd2ea071300 R15: 0000000000022000 [ 884.235033][T16558] [ 884.238127][T16558] Kernel Offset: disabled [ 884.242461][T16558] Rebooting in 86400 seconds..