last executing test programs: 1m30.40942138s ago: executing program 2 (id=323): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xd, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff7fff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x8}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) 1m30.30866114s ago: executing program 2 (id=326): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x4, @perf_bp={&(0x7f0000001080)}, 0x10000, 0x8, 0x0, 0x0, 0x7, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x1d0842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) mkdir(&(0x7f0000000580)='./file0\x00', 0xaa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000202070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x1d, &(0x7f00000001c0), 0x4) r5 = openat$cgroup_procs(r2, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) sendmsg$tipc(r4, &(0x7f0000000540)={&(0x7f0000000340)=@id={0x1e, 0x3, 0x3, {0x4e23, 0x4}}, 0x10, &(0x7f00000004c0)=[{&(0x7f00000003c0)="ad2222b995009ad9048fe817443431a7d20bcb34f79b89d2542049476c5ee281a1550a84f9b3572e2b77028d4b8c8ffbf0af82d60b88c33a85066428d5091c2bf15c8e122f86ddeb1c61f2e3c971bcb706c19e3706a9cacdf25fd6f0", 0x5c}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef9", 0x2a, 0x4000000}, 0x2000c041) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) 1m29.648905775s ago: executing program 2 (id=333): close(0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = perf_event_open(&(0x7f0000000fc0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x66137, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000007c0), 0xc) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x830d}, 0x0, 0x2, 0xfffffffe, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, 0x0, 0x0}, 0x20) recvmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000180), 0x6e, &(0x7f0000000100)=[{&(0x7f00000006c0)=""/179, 0x22fe0}], 0x12}, 0x0) close(0x3) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x2afe0}], 0x1}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 1m29.322408357s ago: executing program 2 (id=338): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x45bd}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r3}, 0x10) close(r1) 1m29.011489359s ago: executing program 2 (id=344): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000002c, &(0x7f0000000100)="b9ff03316844268cb89e14f0080048e0080000000000002177fbac141516e000030a89070203b180008902020000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d7da058f6efa6d1f5f7ff400"/254, 0x0, 0xfe, 0x60000000, 0x0, 0xfffffffe}, 0x2c) 1m28.82496866s ago: executing program 2 (id=347): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b80)=ANY=[], 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d33, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESHEX, @ANYRESOCT], 0x50) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200002000000000000000000000008500000041000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0xd50, 0x0, &(0x7f0000000740)="6fd92f5c3fbecb0c72abdb6e3b92", 0x0, 0x1500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) 1m13.641452479s ago: executing program 32 (id=347): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b80)=ANY=[], 0x50) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d33, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESHEX, @ANYRESOCT], 0x50) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200002000000000000000000000008500000041000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r1, 0x0, 0xd50, 0x0, &(0x7f0000000740)="6fd92f5c3fbecb0c72abdb6e3b92", 0x0, 0x1500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) 26.241449488s ago: executing program 3 (id=500): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r8, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) 25.338725264s ago: executing program 0 (id=502): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r8, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) 21.661193668s ago: executing program 0 (id=504): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r8, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) 21.660575508s ago: executing program 4 (id=506): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r8, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) 20.733518045s ago: executing program 3 (id=508): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 20.261941187s ago: executing program 4 (id=509): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, 0x0, 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 18.825139487s ago: executing program 4 (id=510): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00D'], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 16.912610169s ago: executing program 3 (id=511): perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, 0x0, 0x0) socketpair(0x22, 0x2, 0x23, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="07000000840000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000e15d49b29e0e62165d643a36295d05927284499a877ae432dc14818952588feb526f62588dccfb05b0fa0609f6cd71110e8c452fe93054b6419eabb2dd711057af588158225ff4ac5bafb2692ee3f9862b4be1f83e0963a72d0c45078d048ada6d3f93b1d68d0e99443be0b4e5daaa7bf02503c1edebec", @ANYRES32=0x0, @ANYRES32, @ANYBLOB, @ANYRES8=0x0], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socket$kcm(0x1e, 0x5, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500), 0x2, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) 15.3535842s ago: executing program 0 (id=514): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c05"], 0x30}, 0x7e8166965e22236a) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 13.559089561s ago: executing program 0 (id=515): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000040)=0x1, 0x12) 12.644729237s ago: executing program 5 (id=517): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000040)=0x1, 0x12) 11.719921894s ago: executing program 1 (id=518): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(0xffffffffffffffff) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) 11.642770424s ago: executing program 4 (id=519): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c"], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 11.332863026s ago: executing program 0 (id=522): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, 0x0, 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 10.005432605s ago: executing program 1 (id=524): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 10.005125294s ago: executing program 5 (id=525): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x3, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x89}, [], {0x95, 0x0, 0x5a5}}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000b40)) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1042, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x164000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="b70200001a000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b70600007fffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000004ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034015b67dafe6c8dc3d5d78c07fa1f7e6185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946e0ebc622003b538dfd8e012e79578e51bc5f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b803000000661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7b148ba532e6ea09c346dfebd38608b32a0080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e14861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16b089f37b3591a15c0a9be6eb18208404c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b74cd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f50714600fb6241c6e955031795b2c2f56411e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7cae2cd0a2782d2230fe4bf9865de0d1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeedd005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe00000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35f267632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e80339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd52364600000000000000000000000000000000000000000000dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000a5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f3390343c12aa51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e2a5a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fca4d97a0ae75ccf04e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35e9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff17320adda5867947257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a927de6f4c09f4b742e037381c85d2ec7bb2a8152f0d6a99a0370e0cbd65744eb2efd7b65f04aa7e72588757b9612bb4253a63bb303c0c68a07f115d104f2007237a4f771416741bfd63fdfe3ae6f8bea755d8b7202c2bbae137dc1c3cf40db74a4c1c219d8ddec8f91dae2cdea1353fe062830fa1d233296e99d8317872257e154665485e7f31cdbfbf435517faf93015b57417d84b8bc8662e097d5ba55d02d48e150695ffae3a676555b10da11751865126d19336116a1e58ab727dda6b343cc97f9479136a66f552abf8fe3d134f6d69df1cffe6740f90735f66ca54fd87800b4bda4db5e68aaccf44d24e09f8a769e3ae7bf246673f15e3d1adae4384bdb7cd30a33e30466b421feb96006c810fd3830a1c75af2580727ffc604d2b04f476acc21419fad9b1baec88974da2db29b80859bde08b85c8086e4b7f1fd568042ad5396d3179c71b1dc43291e450ce9b8d7d80fcb44966d7ad4691a37870000000000000000000000000000000000000000000000000000000000000000000083a5765d06da91165d24bc316607e2d69344aa1c07ff7cd7bc3d17f122478b6e81077782b9c298edc2546045feff90e7aa7dc1a869fa55e979e03337707df75b93cf5b8d25242741a88f2d54a7107375b25911aa11efa3a4f87fc14f180e353615b3cb9a5cf5ea843014a277c3694a5a83266f73ef039dd739187923715548d58ff43be997e357e0cbed29faef19c0082e26fb867bf0ff0000000000000000000000a0616252abda1102c3eee13eddef0275f21752ee474e32d790ae1f3df77e303ae1968c2a4450c43e93b97b2c3123ab5b8473b880644e6acfe1d346d1528262c6e91f38029ec24eeb4fe5c1b3726bcfd386ba153fed11692170e5a09432bd02fa9dba861ecad4dbf61a93733a21aeff5f541b8f78bccbf1ac"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x6000002c, &(0x7f0000000100)="b9ff03316844268cb89e14f0080048e0080000000000002177fbac141516e000030a89070203b180008902020000845013f2325f003901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014c0000c0adc043084617d7ecf41effff38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d7da058f6efa6d1f5f7ff400"/254, 0x0, 0xfe, 0x60000000, 0x0, 0xfffffffe}, 0x2c) 10.004900494s ago: executing program 3 (id=526): perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, 0x0, 0x0) socketpair(0x22, 0x2, 0x23, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="07000000840000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000e15d49b29e0e62165d643a36295d05927284499a877ae432dc14818952588feb526f62588dccfb05b0fa0609f6cd71110e8c452fe93054b6419eabb2dd711057af588158225ff4ac5bafb2692ee3f9862b4be1f83e0963a72d0c45078d048ada6d3f93b1d68d0e99443be0b4e5daaa7bf02503c1edebec", @ANYRES32, @ANYBLOB, @ANYRES8=0x0], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c0000001500", 0x6}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500), 0x2, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) 9.742991366s ago: executing program 4 (id=527): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce62"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c05"], 0x30}, 0x7e8166965e22236a) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 8.794065923s ago: executing program 0 (id=528): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{0x0}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c05"], 0x30}, 0x7e8166965e22236a) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 8.096301907s ago: executing program 5 (id=529): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r6 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r6, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(r6) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000040)=0x1, 0x12) 6.540287477s ago: executing program 5 (id=530): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000040)=0x1, 0x12) 6.539925517s ago: executing program 3 (id=531): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 6.538964757s ago: executing program 1 (id=540): perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, 0x0, 0x0) socketpair(0x22, 0x2, 0x23, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="07000000840000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000e15d49b29e0e62165d643a36295d05927284499a877ae432dc14818952588feb526f62588dccfb05b0fa0609f6cd71110e8c452fe93054b6419eabb2dd711057af588158225ff4ac5bafb2692ee3f9862b4be1f83e0963a72d0c45078d048ada6d3f93b1d68d0e99443be0b4e5daaa7bf02503c1edebec", @ANYRES32, @ANYBLOB, @ANYRES8=0x0], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c0000001500", 0x6}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500), 0x2, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) 4.850282668s ago: executing program 5 (id=532): perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3, 0x1, 0xa, 0x0, 0x0, 0x8000000004, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000001946}, 0x0, 0x0, 0x403, 0x6, 0x3fe, 0x80000004, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$inet(r0, 0x0, 0x0) socketpair(0x22, 0x2, 0x23, &(0x7f00000000c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="07000000840000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000e15d49b29e0e62165d643a36295d05927284499a877ae432dc14818952588feb526f62588dccfb05b0fa0609f6cd71110e8c452fe93054b6419eabb2dd711057af588158225ff4ac5bafb2692ee3f9862b4be1f83e0963a72d0c45078d048ada6d3f93b1d68d0e99443be0b4e5daaa7bf02503c1edebec", @ANYRES32, @ANYBLOB, @ANYRES8=0x0], 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5c0000001500", 0x6}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000500), 0x2, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r1}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x5ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1000000}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_clone(0xa49a4080, 0x0, 0x700, 0x0, 0x0, 0xfffffffffffffffc) 4.438432331s ago: executing program 1 (id=533): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB=',\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00'], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8000000580081044e81f782db44b904021d080009000300e8fe55a1180015000600142603600e120900210000000401a8001600a40001", 0x37}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 1.038361533s ago: executing program 4 (id=534): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000040)=0x1, 0x12) 1.037443563s ago: executing program 1 (id=535): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) r8 = socket$kcm(0x2, 0x5, 0x84) close(r8) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_ro(r9, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r10, &(0x7f0000000040)=0x1, 0x12) 1.036809183s ago: executing program 5 (id=536): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c05"], 0x30}, 0x7e8166965e22236a) mkdir(0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) 380.327617ms ago: executing program 3 (id=537): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) write$cgroup_subtree(r1, 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@volatile={0xf, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/51, 0x29, 0x33, 0x1, 0x7, 0x10000, @value=r1}, 0x28) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x2, 0x5}, 0x50) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000380)={0x0, 0x2, 0x10}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000580)={0x0, r4}, 0x8) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, r0, 0x2}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000080)=@raw=[@call={0x85, 0x0, 0x0, 0xbb}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x77, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x5, 0xa, 0x7, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r3, r4, 0xffffffffffffffff, r5], &(0x7f0000000580), 0x10, 0x1}, 0x94) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x0, @private=0xa010101}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000080)="92", 0x1}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x158}, 0x24000840) close(0xffffffffffffffff) write$cgroup_int(r7, &(0x7f0000000040)=0x1, 0x12) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000280)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000040)=0x1, 0x12) 0s ago: executing program 1 (id=538): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000200)=@caif=@rfm={0x25, 0x2, "bf4c484a1fa00081a00200000000bb00"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000140)="18", 0x1}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c1"], 0xfdef) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x3e, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000007940)={&(0x7f0000000100)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c"], 0x30}, 0x7e8166965e22236a) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xc26bfe8e8f6baca8}, 0x20) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001600811e4e81f782db44b9040a1d0802a6cdda08040000a1180002461a1a39738c1e541208010f0100814401a80016ea1f", 0x35}], 0x1, 0x0, 0x0, 0x7400}, 0x4050) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f00c00e}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000001180)={0x0, 0x24, &(0x7f0000000000), 0x1}, 0x4008820) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f9, &(0x7f0000000080)) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000300)="e6593f97fa0cb4fc1cfaaf4a4a7f13abfef52ef35250520eea5e64c34c28b1fae5c63659c3125da8a3895c2e9d794fd5518bfb880813b5901512421cf1c127c3ab70baefc2bc4674e9abd579b8a291a356ed577fe6bafab0ff6725607d488f997b3dcd97d42dea09bea0dc3e3a257367155998125941a520c04356fe56195106a856cfefb0929278cf20cdedfc21173390a9e877de8fb2c6e9c8776c4aafb50b82e189f658323d63eb51ea52c7182804726b8020bf30bd50ccb73be72dc438c754bb15309b592c38c800d896e95eadb1f112df6ff57f1a3cb9781897e7e483b225b81ac379f6d819a7", 0xe9}, {&(0x7f0000000080)="5b0852ded17a60be3bdc70b2edc2e22fbf9715e1f6fea4d5e52cb9f53394f89c579bc705b761ccc01f5a1e3f27508afbacc625f4f32d48d30764a0e26c5ee7bd36d841047f977f2c75a53d831e4a6d068a4ab8febc3ae44cd833b3202aac083aa6d70aec12d9cf7b91ec6bcda54c35a73d517fea3c928ef617f530e5ee5bf6877b68c118be40a37188bf1404907e1964cec3d2a0e0c4e9aba449c611cd579fc8fec0e7386f94149b6000d274aa43e1a517f40c4d058c3148", 0xb8}], 0x2, &(0x7f0000000500)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0xfd}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x3, 0x46}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x5, [@multicast1]}, @ssrr={0x89, 0xb, 0x27, [@local, @rand_addr=0x64010101]}, @generic={0x82, 0x8, "5c1cc06489ef"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x81}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x126}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @dev={0xac, 0x14, 0x14, 0x39}}}}], 0xb8}, 0x4df6fe611edf6c67) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.150' (ED25519) to the list of known hosts. [ 58.896967][ T4172] cgroup: Unknown subsys name 'net' [ 59.013246][ T4172] cgroup: Unknown subsys name 'rlimit' Setting up swapspace version 1, size = 127995904 bytes [ 60.561280][ T4172] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k FS [ 62.042661][ T4182] chnl_net:caif_netlink_parms(): no params data found [ 62.057674][ T4188] chnl_net:caif_netlink_parms(): no params data found [ 62.159635][ T4186] chnl_net:caif_netlink_parms(): no params data found [ 62.213503][ T4182] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.221452][ T4182] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.230198][ T4182] device bridge_slave_0 entered promiscuous mode [ 62.248108][ T4195] chnl_net:caif_netlink_parms(): no params data found [ 62.277824][ T4182] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.285023][ T4182] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.293731][ T4182] device bridge_slave_1 entered promiscuous mode [ 62.325491][ T4190] chnl_net:caif_netlink_parms(): no params data found [ 62.348880][ T4188] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.359987][ T4188] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.368069][ T4188] device bridge_slave_0 entered promiscuous mode [ 62.403799][ T4188] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.411119][ T4188] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.419670][ T4188] device bridge_slave_1 entered promiscuous mode [ 62.449833][ T4182] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.496009][ T4182] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.505902][ T4186] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.513236][ T4186] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.521328][ T4186] device bridge_slave_0 entered promiscuous mode [ 62.534185][ T4188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.546080][ T4188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.559060][ T4195] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.566245][ T4195] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.574382][ T4195] device bridge_slave_0 entered promiscuous mode [ 62.583731][ T4195] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.591102][ T4195] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.599646][ T4195] device bridge_slave_1 entered promiscuous mode [ 62.622939][ T4186] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.630137][ T4186] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.638197][ T4186] device bridge_slave_1 entered promiscuous mode [ 62.691272][ T4195] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.703775][ T4182] team0: Port device team_slave_0 added [ 62.727063][ T4188] team0: Port device team_slave_0 added [ 62.745247][ T4195] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.756539][ T4182] team0: Port device team_slave_1 added [ 62.764106][ T4186] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.775356][ T4188] team0: Port device team_slave_1 added [ 62.781617][ T4190] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.789027][ T4190] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.797531][ T4190] device bridge_slave_0 entered promiscuous mode [ 62.828950][ T4186] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 62.844859][ T4190] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.852306][ T4190] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.860240][ T4190] device bridge_slave_1 entered promiscuous mode [ 62.877054][ T4182] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 62.884048][ T4182] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.910847][ T4182] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 62.948015][ T4195] team0: Port device team_slave_0 added [ 62.954412][ T4182] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 62.961623][ T4182] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 62.987604][ T4182] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.007604][ T4188] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.014603][ T4188] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.041066][ T4188] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.063125][ T4195] team0: Port device team_slave_1 added [ 63.082224][ T4186] team0: Port device team_slave_0 added [ 63.089278][ T4188] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.097541][ T4188] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.123966][ T4188] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.138064][ T4190] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.169349][ T4186] team0: Port device team_slave_1 added [ 63.189260][ T4190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.199241][ T4195] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.206335][ T4195] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.232524][ T4195] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.264256][ T4182] device hsr_slave_0 entered promiscuous mode [ 63.271297][ T4182] device hsr_slave_1 entered promiscuous mode [ 63.285931][ T4195] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.293166][ T4195] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.319373][ T4195] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.339932][ T4186] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.347072][ T4186] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.373361][ T4186] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.421737][ T4186] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.429054][ T4186] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.455196][ T4186] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.472543][ T4190] team0: Port device team_slave_0 added [ 63.482782][ T4190] team0: Port device team_slave_1 added [ 63.492167][ T4188] device hsr_slave_0 entered promiscuous mode [ 63.499208][ T4188] device hsr_slave_1 entered promiscuous mode [ 63.505883][ T4188] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.514119][ T4188] Cannot create hsr debugfs directory [ 63.571357][ T4195] device hsr_slave_0 entered promiscuous mode [ 63.579057][ T4195] device hsr_slave_1 entered promiscuous mode [ 63.585757][ T4195] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.593778][ T4195] Cannot create hsr debugfs directory [ 63.611530][ T4190] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.617374][ T1107] Bluetooth: hci1: command 0x0409 tx timeout [ 63.619211][ T4190] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.625537][ T1107] Bluetooth: hci0: command 0x0409 tx timeout [ 63.651255][ T4190] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.669799][ T4190] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.677408][ T4190] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.696425][ T2301] Bluetooth: hci4: command 0x0409 tx timeout [ 63.709549][ T4190] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.709583][ T1107] Bluetooth: hci2: command 0x0409 tx timeout [ 63.726955][ T1107] Bluetooth: hci3: command 0x0409 tx timeout [ 63.778564][ T4186] device hsr_slave_0 entered promiscuous mode [ 63.785692][ T4186] device hsr_slave_1 entered promiscuous mode [ 63.792534][ T4186] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.800904][ T4186] Cannot create hsr debugfs directory [ 63.858008][ T4190] device hsr_slave_0 entered promiscuous mode [ 63.865137][ T4190] device hsr_slave_1 entered promiscuous mode [ 63.872192][ T4190] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 63.879880][ T4190] Cannot create hsr debugfs directory [ 64.160926][ T4182] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 64.189081][ T4182] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 64.210080][ T4182] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 64.228940][ T4188] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 64.246012][ T4182] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 64.255162][ T4188] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 64.275680][ T4188] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 64.308695][ T4188] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 64.330075][ T4195] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 64.361951][ T4195] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 64.388861][ T4195] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 64.406871][ T4195] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 64.487083][ T4188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.502694][ T4182] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.510133][ T4190] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 64.526345][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.535588][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.549190][ T4190] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 64.570052][ T4190] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 64.580729][ T4190] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 64.602798][ T4188] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.640992][ T4182] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.649097][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.659709][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.669799][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.677366][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.687104][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.697414][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.706859][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.717036][ T4186] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 64.729215][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.742599][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.752397][ T144] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.759634][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.785721][ T4186] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 64.795637][ T4186] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 64.805342][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.819196][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.827875][ T1443] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.834937][ T1443] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.843348][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.852583][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.861544][ T1443] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.868705][ T1443] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.899072][ T4186] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 64.910203][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.919761][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.930710][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.940495][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.951486][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.960338][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.973226][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 64.981558][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.991078][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.010469][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.024293][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.037020][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.074682][ T4182] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.087455][ T4182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.101818][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.113215][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.122800][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.132953][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.142348][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.155166][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.164152][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.190912][ T4195] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.202429][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.216959][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.252765][ T4190] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.267279][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.279974][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.291627][ T4188] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.303823][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.313348][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.343489][ T4195] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.362857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.375772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.391638][ T4190] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.428361][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.438455][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.453734][ T4264] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.460901][ T4264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.469303][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.478751][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.487640][ T4264] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.495021][ T4264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.503234][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.519554][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.527995][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.537573][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.546013][ T4264] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.553124][ T4264] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.582940][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.595656][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.605587][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.618492][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.630566][ T4264] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.637735][ T4264] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.645930][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.671772][ T4186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.688169][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.695737][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.703667][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 65.711781][ T23] Bluetooth: hci0: command 0x041b tx timeout [ 65.718013][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 65.718253][ T23] Bluetooth: hci1: command 0x041b tx timeout [ 65.725608][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.741464][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.750412][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.765012][ T4182] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.776835][ T23] Bluetooth: hci3: command 0x041b tx timeout [ 65.783599][ T23] Bluetooth: hci2: command 0x041b tx timeout [ 65.789890][ T23] Bluetooth: hci4: command 0x041b tx timeout [ 65.798937][ T4188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.807397][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.815358][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.824793][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.834552][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.843741][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.853511][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.863962][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.872639][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.902290][ T4190] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.915553][ T4190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.933608][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.942835][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.958028][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.968135][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.982009][ T4186] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.018368][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.035445][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.044160][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.059454][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.095491][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.105090][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.115559][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 66.124703][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 66.134314][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.143005][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.151566][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.160901][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.169735][ T154] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.176852][ T154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.184688][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.193730][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.202580][ T154] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.209804][ T154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.219056][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.259460][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.270118][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.279674][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.287575][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.295072][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.303724][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.313587][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.321986][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.344697][ T4188] device veth0_vlan entered promiscuous mode [ 66.357663][ T4182] device veth0_vlan entered promiscuous mode [ 66.393862][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.404977][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.414356][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 66.426053][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 66.435594][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.444965][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.453923][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.464107][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 66.472338][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 66.487324][ T4188] device veth1_vlan entered promiscuous mode [ 66.509385][ T4190] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.525823][ T4182] device veth1_vlan entered promiscuous mode [ 66.537204][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 66.561205][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 66.575522][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 66.586684][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.595342][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.614468][ T4186] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.628977][ T4186] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.658253][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 66.668071][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.678717][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.705030][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.727496][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.735071][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 66.752254][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.772728][ T4182] device veth0_macvtap entered promiscuous mode [ 66.791448][ T4182] device veth1_macvtap entered promiscuous mode [ 66.817740][ T4195] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.840643][ T4188] device veth0_macvtap entered promiscuous mode [ 66.873922][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 66.884061][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 66.899863][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 66.912256][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 66.924802][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 66.941022][ T4182] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 66.974862][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 66.985654][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 66.999337][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.008797][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.023232][ T4188] device veth1_macvtap entered promiscuous mode [ 67.043252][ T4182] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.069594][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.080100][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.090419][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.099386][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.108062][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.116812][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.125521][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.134745][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.143500][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.154113][ T4182] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.163842][ T4182] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.173956][ T4182] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.182938][ T4182] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.193685][ T4195] device veth0_vlan entered promiscuous mode [ 67.222847][ T4188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 67.234622][ T4188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.248591][ T4188] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.257827][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.265422][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.273430][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 67.282971][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 67.304091][ T4186] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.334511][ T4195] device veth1_vlan entered promiscuous mode [ 67.344348][ T4188] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 67.355305][ T4188] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.369884][ T4188] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.378999][ T4190] device veth0_vlan entered promiscuous mode [ 67.387281][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.396043][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.404905][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 67.414030][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 67.424245][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.433053][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.475506][ T4188] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.484979][ T4188] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.497148][ T4188] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.505891][ T4188] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.529365][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.538709][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.569158][ T4195] device veth0_macvtap entered promiscuous mode [ 67.580693][ T4190] device veth1_vlan entered promiscuous mode [ 67.598512][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 67.608185][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.618207][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.627364][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 67.654813][ T4195] device veth1_macvtap entered promiscuous mode [ 67.717691][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 67.730622][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 67.739460][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.748465][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.757479][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.765419][ T541] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.776858][ T23] Bluetooth: hci1: command 0x040f tx timeout [ 67.783267][ T23] Bluetooth: hci0: command 0x040f tx timeout [ 67.798505][ T4190] device veth0_macvtap entered promiscuous mode [ 67.813468][ T4186] device veth0_vlan entered promiscuous mode [ 67.825703][ T4264] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.826034][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 67.838668][ T4264] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.845987][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 67.859854][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 67.867089][ T4252] Bluetooth: hci4: command 0x040f tx timeout [ 67.869257][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 67.881536][ T4252] Bluetooth: hci2: command 0x040f tx timeout [ 67.896305][ T4190] device veth1_macvtap entered promiscuous mode [ 67.911736][ T4252] Bluetooth: hci3: command 0x040f tx timeout [ 67.923974][ T4186] device veth1_vlan entered promiscuous mode [ 67.938546][ T4195] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 67.950409][ T4195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.960702][ T4195] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 67.971571][ T4195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 67.982892][ T4195] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.012814][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 68.017782][ T144] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.030312][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.039360][ T144] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.045658][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.056980][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.065856][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 68.085607][ T4195] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.101954][ T4195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.111981][ T4195] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.123577][ T4195] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.135185][ T4195] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.153148][ T4195] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.162458][ T4195] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.171438][ T4195] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.182571][ T4195] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.210198][ T4264] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.211405][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 68.219355][ T4264] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.228977][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.247185][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.256030][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 68.276675][ T144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.285677][ T144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.309271][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.318315][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.334871][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 68.355764][ T4186] device veth0_macvtap entered promiscuous mode [ 68.368412][ T4190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.392731][ T4190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.403528][ T4190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.414932][ T4190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.428898][ T4190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.439890][ T4190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.451485][ T4190] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.480822][ T4186] device veth1_macvtap entered promiscuous mode [ 68.494933][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 68.530869][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.548963][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.564950][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.586262][ T4190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.603922][ T4190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.616041][ T4190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.632857][ T4190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.643332][ T4190] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.655189][ T4190] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.668458][ T4190] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.697791][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.709041][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.720685][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.740543][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.759598][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.770570][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.781305][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.793094][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.804422][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 68.815202][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.829430][ T4186] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.864437][ T4190] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.873785][ T4190] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.882942][ T4190] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.892058][ T4190] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.907678][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.917406][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.928494][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.940718][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.950622][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.961312][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.971309][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 68.982973][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.993273][ T4186] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 69.003851][ T4186] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.015699][ T4186] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 69.057936][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.067985][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.089354][ T4186] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.099812][ T4186] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.112686][ T4186] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.122113][ T4186] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.149911][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.184013][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.263230][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.320577][ T154] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.352815][ T154] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.367555][ T541] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.391723][ T541] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.401247][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.432227][ T154] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.516041][ T154] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.535741][ T154] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.558792][ T4264] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.591265][ T4264] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.605022][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 69.675802][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.701228][ T1443] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.767185][ T1443] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.788236][ C1] hrtimer: interrupt took 42539 ns [ 69.808917][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 69.859160][ T4252] Bluetooth: hci0: command 0x0419 tx timeout [ 69.875918][ T4252] Bluetooth: hci1: command 0x0419 tx timeout [ 69.959356][ T21] Bluetooth: hci3: command 0x0419 tx timeout [ 69.969355][ T21] Bluetooth: hci2: command 0x0419 tx timeout [ 69.998468][ T21] Bluetooth: hci4: command 0x0419 tx timeout [ 70.399702][ T4323] netlink: 152 bytes leftover after parsing attributes in process `syz.4.10'. [ 70.438813][ T4323] netlink: 6 bytes leftover after parsing attributes in process `syz.4.10'. [ 70.888254][ T4338] netlink: 'syz.4.12': attribute type 25 has an invalid length. [ 71.462274][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.469335][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.602992][ T1110] cfg80211: failed to load regulatory.db [ 73.313633][ T4406] netlink: 'syz.1.35': attribute type 25 has an invalid length. [ 73.683515][ T4403] syz.1.35 (4403) used greatest stack depth: 17280 bytes left [ 76.591409][ T23] Bluetooth: hci1: command 0x2016 tx timeout [ 76.816655][ T4539] Bluetooth: hci0: command 0x0406 tx timeout [ 77.767026][ T4597] device sit0 entered promiscuous mode [ 78.341192][ T4609] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.866379][ T1107] Bluetooth: hci2: command 0x0406 tx timeout [ 87.315471][ T4859] bridge0: port 2(bridge_slave_1) entered disabled state [ 88.773055][ T4908] device syzkaller0 entered promiscuous mode [ 91.492646][ T5000] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 95.800700][ T5168] Zero length message leads to an empty skb [ 96.207368][ T5185] delete_channel: no stack [ 96.242864][ T5185] delete_channel: no stack [ 96.259214][ T5181] device bridge0 entered promiscuous mode [ 97.985552][ T5212] delete_channel: no stack [ 98.058687][ T5212] delete_channel: no stack [ 98.745848][ T5227] device bridge0 entered promiscuous mode [ 99.102577][ T5237] delete_channel: no stack [ 99.153944][ T5237] delete_channel: no stack [ 99.394967][ T5243] delete_channel: no stack [ 99.516466][ T5243] delete_channel: no stack [ 101.578752][ T5262] delete_channel: no stack [ 101.665183][ T5262] delete_channel: no stack [ 104.372587][ T5290] device bridge0 entered promiscuous mode [ 104.546825][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 106.105876][ T5305] delete_channel: no stack [ 106.176320][ T5305] delete_channel: no stack [ 106.681875][ T5309] delete_channel: no stack [ 106.731636][ T5309] delete_channel: no stack [ 107.327312][ T5316] delete_channel: no stack [ 107.331901][ T5316] delete_channel: no stack [ 110.515645][ T5343] device bridge0 entered promiscuous mode [ 111.724624][ T5351] chnl_net:caif_netlink_parms(): no params data found [ 112.226561][ T5372] delete_channel: no stack [ 112.273575][ T5372] delete_channel: no stack [ 112.976535][ T4244] Bluetooth: hci5: command 0x0409 tx timeout [ 114.558020][ T5351] bridge0: port 1(bridge_slave_0) entered blocking state [ 114.565144][ T5351] bridge0: port 1(bridge_slave_0) entered disabled state [ 114.627778][ T5351] device bridge_slave_0 entered promiscuous mode [ 114.705431][ T5351] bridge0: port 2(bridge_slave_1) entered blocking state [ 114.726475][ T5351] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.734710][ T5351] device bridge_slave_1 entered promiscuous mode [ 115.056281][ T4253] Bluetooth: hci5: command 0x041b tx timeout [ 115.648489][ T5351] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 115.701837][ T5351] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 116.181554][ T5409] delete_channel: no stack [ 116.366418][ T5409] delete_channel: no stack [ 116.753099][ T5351] team0: Port device team_slave_0 added [ 116.798603][ T5351] team0: Port device team_slave_1 added [ 117.076777][ T5351] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 117.083925][ T5351] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 117.146207][ T23] Bluetooth: hci5: command 0x040f tx timeout [ 117.196251][ T5351] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 117.229270][ T5351] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 117.256260][ T5351] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 117.344335][ T5351] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 118.327587][ T5427] delete_channel: no stack [ 118.332164][ T5427] delete_channel: no stack [ 118.452184][ T5351] device hsr_slave_0 entered promiscuous mode [ 118.508856][ T5351] device hsr_slave_1 entered promiscuous mode [ 118.547210][ T5351] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 118.554839][ T5351] Cannot create hsr debugfs directory [ 119.234239][ T23] Bluetooth: hci5: command 0x0419 tx timeout [ 120.039231][ T541] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.469154][ T541] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 122.322408][ T541] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.328260][ T541] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.839173][ T5351] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 124.231325][ T5351] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 124.442217][ T5486] delete_channel: no stack [ 124.761058][ T5486] delete_channel: no stack [ 125.040208][ T5351] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 125.349975][ T5351] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 126.600283][ T5351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 126.671076][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 126.688530][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.734401][ T5351] 8021q: adding VLAN 0 to HW filter on device team0 [ 126.893396][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 126.920467][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.984943][ T4301] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.992284][ T4301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 127.022096][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 127.077203][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 127.105132][ T4301] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.112685][ T4301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 127.173444][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 127.194245][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 127.235605][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 127.288272][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 127.342843][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 127.370116][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 127.424082][ T5351] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 127.477629][ T5351] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 127.568568][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 127.597375][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 127.643769][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 127.668999][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 127.698237][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 127.754104][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.281646][ T5550] delete_channel: no stack [ 128.351501][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 128.566312][ T5550] delete_channel: no stack [ 128.659523][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 128.667952][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 128.707493][ T5351] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 130.193658][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 130.216865][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.294228][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 130.327712][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.350790][ T5351] device veth0_vlan entered promiscuous mode [ 130.377943][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 130.391395][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 130.412804][ T5351] device veth1_vlan entered promiscuous mode [ 130.484572][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 130.528136][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 130.552271][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 130.581997][ T5599] delete_channel: no stack [ 130.588309][ T4309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.629649][ T5351] device veth0_macvtap entered promiscuous mode [ 130.668910][ T5351] device veth1_macvtap entered promiscuous mode [ 130.723764][ T5599] delete_channel: no stack [ 130.748883][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 130.806167][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.846522][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 130.876646][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 130.911987][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 130.977793][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.017530][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 131.069510][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.106243][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 131.156203][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 131.187870][ T5351] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 131.198350][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 131.227840][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 131.293755][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 131.327541][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 131.649719][ T5620] delete_channel: no stack [ 131.678741][ T5620] delete_channel: no stack [ 132.207351][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 132.296684][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.318907][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 132.344223][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.379157][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 132.426432][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.483608][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 132.527252][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.562720][ T5351] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 132.600489][ T5351] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 132.619653][ T5351] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 132.641530][ T5626] delete_channel: no stack [ 132.675909][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.696325][ T5626] delete_channel: no stack [ 132.697293][ T4301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.737072][ T5351] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.745825][ T5351] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.783780][ T5351] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.819006][ T5351] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.901675][ T1421] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.908165][ T1421] ieee802154 phy1 wpan1: encryption failed: -22 [ 133.542020][ T4301] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.565925][ T4301] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 133.618846][ T1443] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 133.643173][ T1443] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 133.681349][ T1443] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 134.275928][ T4264] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 135.121533][ T5662] delete_channel: no stack [ 135.151732][ T5662] delete_channel: no stack [ 136.183791][ T5688] delete_channel: no stack [ 136.214041][ T5688] delete_channel: no stack [ 137.287317][ T5699] delete_channel: no stack [ 137.292151][ T5699] delete_channel: no stack [ 137.659607][ T5711] delete_channel: no stack [ 137.664181][ T5711] delete_channel: no stack [ 141.369386][ T5769] delete_channel: no stack [ 141.373951][ T5769] delete_channel: no stack [ 144.036411][ T541] device hsr_slave_0 left promiscuous mode [ 144.076337][ T541] device hsr_slave_1 left promiscuous mode [ 144.386066][ T541] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 144.393799][ T541] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 144.777707][ T541] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 144.785208][ T541] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 144.866589][ T5796] delete_channel: no stack [ 145.064562][ T5796] delete_channel: no stack [ 145.077116][ T541] device bridge_slave_1 left promiscuous mode [ 145.084550][ T541] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.126537][ T5801] delete_channel: no stack [ 145.131103][ T5801] delete_channel: no stack [ 145.850455][ T541] device bridge_slave_0 left promiscuous mode [ 145.896481][ T541] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.938230][ T541] device veth1_macvtap left promiscuous mode [ 146.944877][ T541] device veth0_macvtap left promiscuous mode [ 146.987522][ T541] device veth1_vlan left promiscuous mode [ 146.993633][ T541] device veth0_vlan left promiscuous mode [ 147.275606][ T5813] delete_channel: no stack [ 147.421787][ T5813] delete_channel: no stack [ 148.496351][ T5819] delete_channel: no stack [ 148.500932][ T5819] delete_channel: no stack [ 148.799010][ T541] team0 (unregistering): Port device team_slave_1 removed [ 148.918284][ T541] team0 (unregistering): Port device team_slave_0 removed [ 148.967701][ T541] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 149.037440][ T541] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 149.433739][ T541] bond0 (unregistering): Released all slaves [ 154.782609][ T5891] delete_channel: no stack [ 154.796332][ T5891] delete_channel: no stack [ 167.494004][ T6076] delete_channel: no stack [ 167.510225][ T6076] delete_channel: no stack [ 170.713124][ T6093] delete_channel: no stack [ 170.792417][ T6093] delete_channel: no stack [ 174.879842][ T6124] delete_channel: no stack [ 174.884519][ T6124] delete_channel: no stack [ 177.629781][ T6140] delete_channel: no stack [ 177.634367][ T6140] delete_channel: no stack [ 179.886314][ T6149] delete_channel: no stack [ 179.986385][ T6149] delete_channel: no stack [ 181.938713][ T5897] syz.3.495 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 182.191620][ T5897] CPU: 1 PID: 5897 Comm: syz.3.495 Not tainted syzkaller #0 [ 182.198979][ T5897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 182.209173][ T5897] Call Trace: [ 182.212494][ T5897] [ 182.215445][ T5897] dump_stack_lvl+0x168/0x230 [ 182.220175][ T5897] ? show_regs_print_info+0x20/0x20 [ 182.225408][ T5897] ? load_image+0x3b0/0x3b0 [ 182.229969][ T5897] ? local_lock_release+0x170/0x170 [ 182.235205][ T5897] ? __rwlock_init+0x140/0x140 [ 182.240005][ T5897] dump_header+0xd4/0x770 [ 182.244381][ T5897] oom_kill_process+0x20e/0x3d0 [ 182.249286][ T5897] out_of_memory+0xe43/0x11e0 [ 182.254085][ T5897] ? mutex_lock_io_nested+0x60/0x60 [ 182.259412][ T5897] ? unregister_oom_notifier+0x20/0x20 [ 182.264931][ T5897] mem_cgroup_out_of_memory+0x277/0x370 [ 182.270617][ T5897] ? mem_cgroup_oom_trylock+0x210/0x210 [ 182.276212][ T5897] ? do_raw_spin_unlock+0x11d/0x230 [ 182.281469][ T5897] try_charge_memcg+0xf79/0x14a0 [ 182.286463][ T5897] ? get_mem_cgroup_from_objcg+0x120/0x120 [ 182.292302][ T5897] ? alloc_pages_vma+0x3d0/0x7c0 [ 182.297525][ T5897] ? rcu_lock_acquire+0x30/0x30 [ 182.302656][ T5897] charge_memcg+0x100/0x2e0 [ 182.308076][ T5897] ? __mem_cgroup_charge+0x80/0x80 [ 182.313232][ T5897] __mem_cgroup_charge+0x21/0x80 [ 182.318200][ T5897] shmem_add_to_page_cache+0xa83/0x14b0 [ 182.323808][ T5897] ? put_page+0x200/0x200 [ 182.328344][ T5897] ? mark_lock+0x94/0x320 [ 182.332706][ T5897] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 182.338737][ T5897] shmem_getpage_gfp+0x1793/0x2d40 [ 182.344012][ T5897] shmem_write_begin+0xcd/0x1a0 [ 182.348907][ T5897] generic_perform_write+0x2aa/0x530 [ 182.354309][ T5897] ? atime_needs_update+0x780/0x780 [ 182.359561][ T5897] ? grab_cache_page_write_begin+0xa0/0xa0 [ 182.365417][ T5897] ? file_remove_privs+0x590/0x590 [ 182.370577][ T5897] ? read_lock_is_recursive+0x10/0x10 [ 182.376073][ T5897] ? preempt_count_add+0x8d/0x190 [ 182.381129][ T5897] ? rwsem_write_trylock+0x12f/0x1b0 [ 182.386455][ T5897] ? clear_nonspinnable+0x60/0x60 [ 182.391520][ T5897] __generic_file_write_iter+0x25f/0x4e0 [ 182.397190][ T5897] generic_file_write_iter+0xa6/0x1b0 [ 182.402593][ T5897] __kernel_write+0x4f9/0x930 [ 182.407312][ T5897] ? vfs_read+0xcf0/0xcf0 [ 182.411667][ T5897] ? preempt_count_add+0x8d/0x190 [ 182.417177][ T5897] ? __up_read+0x27c/0x660 [ 182.421777][ T5897] ? up_read+0x20/0x20 [ 182.426049][ T5897] ? get_dump_page+0x4cc/0x670 [ 182.430944][ T5897] __dump_emit+0x243/0x360 [ 182.435414][ T5897] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 182.440921][ T5897] ? dump_emit+0x153/0x3d0 [ 182.445379][ T5897] dump_user_range+0x84/0x340 [ 182.450095][ T5897] elf_core_dump+0x2ff7/0x3530 [ 182.454929][ T5897] ? load_elf_library+0x8b0/0x8b0 [ 182.459992][ T5897] ? verify_lock_unused+0x140/0x140 [ 182.465233][ T5897] ? dump_vma_snapshot+0xb00/0xe20 [ 182.470554][ T5897] ? rcu_read_lock_any_held+0xb0/0x120 [ 182.476054][ T5897] ? do_raw_spin_unlock+0x11d/0x230 [ 182.481300][ T5897] do_coredump+0x1419/0x2960 [ 182.485949][ T5897] ? nfs_ssc_unregister+0x30/0x30 [ 182.491039][ T5897] ? lock_chain_count+0x20/0x20 [ 182.495963][ T5897] ? _raw_spin_unlock_irq+0x1f/0x40 [ 182.501205][ T5897] ? lockdep_hardirqs_on+0x94/0x140 [ 182.506532][ T5897] get_signal+0x40a/0x12c0 [ 182.511013][ T5897] arch_do_signal_or_restart+0xc1/0x1300 [ 182.516707][ T5897] ? force_sig_fault_to_task+0x110/0x110 [ 182.522482][ T5897] ? get_sigframe_size+0x10/0x10 [ 182.527469][ T5897] ? __bad_area_nosemaphore+0x3f4/0x5a0 [ 182.533076][ T5897] ? lockdep_hardirqs_on_prepare+0x3fc/0x760 [ 182.539127][ T5897] ? exit_to_user_mode_loop+0x3b/0x130 [ 182.544640][ T5897] exit_to_user_mode_loop+0x9e/0x130 [ 182.549957][ T5897] exit_to_user_mode_prepare+0xee/0x180 [ 182.555548][ T5897] irqentry_exit_to_user_mode+0x5/0x30 [ 182.561061][ T5897] exc_page_fault+0x88/0x100 [ 182.565711][ T5897] asm_exc_page_fault+0x22/0x30 [ 182.570604][ T5897] RIP: 0033:0x7f6ae2e7c6d1 [ 182.575057][ T5897] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 182.594701][ T5897] RSP: 002b:00000000fffffeb0 EFLAGS: 00010217 [ 182.600808][ T5897] RAX: 0000000000000000 RBX: 00007f6ae30d2fa0 RCX: 00007f6ae2e7c6c9 [ 182.608827][ T5897] RDX: 0000000000000000 RSI: 00000000fffffeb0 RDI: 0000000002000400 [ 182.616833][ T5897] RBP: 00007f6ae2efef91 R08: 0000000000000000 R09: 0000000000000000 [ 182.624864][ T5897] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 182.632967][ T5897] R13: 00007f6ae30d3038 R14: 00007f6ae30d2fa0 R15: 00007ffe8b235a68 [ 182.641162][ T5897] [ 184.110377][ T4192] ------------[ cut here ]------------ [ 184.116293][ T4192] WARNING: CPU: 1 PID: 4192 at net/bluetooth/hci_conn.c:443 hci_conn_timeout+0x24f/0x450 [ 184.126204][ T4192] Modules linked in: [ 184.130235][ T4192] CPU: 1 PID: 4192 Comm: kworker/u5:3 Not tainted syzkaller #0 [ 184.139532][ T4192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 184.149725][ T4192] Workqueue: hci0 hci_conn_timeout [ 184.154884][ T4192] RIP: 0010:hci_conn_timeout+0x24f/0x450 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 184.161034][ T4192] Code: 69 8d e8 34 4e f0 f8 48 8b 35 55 b7 9d 04 bf 08 00 00 00 48 89 da 5b 41 5c 41 5d 41 5e 41 5f 5d e9 f6 20 81 f8 e8 f1 e5 ab f8 <0f> 0b e9 35 fe ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c dd fd [ 184.181359][ T4192] RSP: 0018:ffffc90002effc08 EFLAGS: 00010293 [ 184.187636][ T4192] RAX: ffffffff88cbe61f RBX: ffff88807a6a2138 RCX: ffff88801abbd940 [ 184.195729][ T4192] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 184.203872][ T4192] RBP: 00000000ffffffff R08: dffffc0000000000 R09: ffffed100f4d4403 [ 184.211925][ T4192] R10: ffffed100f4d4403 R11: 1ffff1100f4d4402 R12: dffffc0000000000 [ 184.220175][ T4192] R13: dffffc0000000000 R14: ffff88807a6a2000 R15: ffff88807a6a2010 [ 184.228319][ T4192] FS: 0000000000000000(0000) GS:ffff8880b9100000(0000) knlGS:0000000000000000 [ 184.238425][ T4192] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 184.245674][ T4192] CR2: 0000001b3241eff8 CR3: 0000000078c9b000 CR4: 00000000003506e0 [ 184.253828][ T4192] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 184.262053][ T4192] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 184.270350][ T4192] Call Trace: [ 184.273674][ T4192] [ 184.276684][ T4192] process_one_work+0x863/0x1000 [ 184.281767][ T4192] ? worker_detach_from_pool+0x240/0x240 [ 184.287492][ T4192] ? lockdep_hardirqs_off+0x70/0x100 [ 184.292828][ T4192] ? _raw_spin_lock_irq+0xab/0xe0 [ 184.298032][ T4192] ? _raw_spin_lock_irqsave+0xf0/0xf0 [ 184.303444][ T4192] ? wq_worker_running+0x97/0x170 [ 184.308586][ T4192] worker_thread+0xaa8/0x12a0 [ 184.313334][ T4192] kthread+0x436/0x520 [ 184.317623][ T4192] ? rcu_lock_release+0x20/0x20 [ 184.322531][ T4192] ? kthread_blkcg+0xd0/0xd0 [ 184.327210][ T4192] ret_from_fork+0x1f/0x30 [ 184.331684][ T4192] [ 184.334758][ T4192] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 184.342112][ T4192] CPU: 1 PID: 4192 Comm: kworker/u5:3 Not tainted syzkaller #0 [ 184.349695][ T4192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 184.359787][ T4192] Workqueue: hci0 hci_conn_timeout [ 184.364942][ T4192] Call Trace: [ 184.368244][ T4192] [ 184.371209][ T4192] dump_stack_lvl+0x168/0x230 [ 184.375929][ T4192] ? show_regs_print_info+0x20/0x20 [ 184.381248][ T4192] ? load_image+0x3b0/0x3b0 [ 184.385809][ T4192] panic+0x2c9/0x7f0 [ 184.389837][ T4192] ? bpf_jit_dump+0xd0/0xd0 [ 184.394393][ T4192] ? ret_from_fork+0x1f/0x30 [ 184.399033][ T4192] ? hci_conn_timeout+0x24f/0x450 [ 184.404369][ T4192] __warn+0x248/0x2b0 [ 184.408388][ T4192] ? hci_conn_timeout+0x24f/0x450 [ 184.413444][ T4192] report_bug+0x1b7/0x2e0 [ 184.417828][ T4192] handle_bug+0x3a/0x70 [ 184.422037][ T4192] exc_invalid_op+0x16/0x40 [ 184.426581][ T4192] asm_exc_invalid_op+0x16/0x20 [ 184.431488][ T4192] RIP: 0010:hci_conn_timeout+0x24f/0x450 [ 184.437172][ T4192] Code: 69 8d e8 34 4e f0 f8 48 8b 35 55 b7 9d 04 bf 08 00 00 00 48 89 da 5b 41 5c 41 5d 41 5e 41 5f 5d e9 f6 20 81 f8 e8 f1 e5 ab f8 <0f> 0b e9 35 fe ff ff 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c dd fd [ 184.456811][ T4192] RSP: 0018:ffffc90002effc08 EFLAGS: 00010293 [ 184.463088][ T4192] RAX: ffffffff88cbe61f RBX: ffff88807a6a2138 RCX: ffff88801abbd940 [ 184.471095][ T4192] RDX: 0000000000000000 RSI: 00000000ffffffff RDI: 0000000000000000 [ 184.479101][ T4192] RBP: 00000000ffffffff R08: dffffc0000000000 R09: ffffed100f4d4403 [ 184.487116][ T4192] R10: ffffed100f4d4403 R11: 1ffff1100f4d4402 R12: dffffc0000000000 [ 184.495384][ T4192] R13: dffffc0000000000 R14: ffff88807a6a2000 R15: ffff88807a6a2010 [ 184.503401][ T4192] ? hci_conn_timeout+0x24f/0x450 [ 184.508477][ T4192] ? hci_conn_timeout+0x24f/0x450 [ 184.513552][ T4192] process_one_work+0x863/0x1000 [ 184.518541][ T4192] ? worker_detach_from_pool+0x240/0x240 [ 184.524555][ T4192] ? lockdep_hardirqs_off+0x70/0x100 [ 184.529876][ T4192] ? _raw_spin_lock_irq+0xab/0xe0 [ 184.534925][ T4192] ? _raw_spin_lock_irqsave+0xf0/0xf0 [ 184.540327][ T4192] ? wq_worker_running+0x97/0x170 [ 184.545380][ T4192] worker_thread+0xaa8/0x12a0 [ 184.550122][ T4192] kthread+0x436/0x520 [ 184.554231][ T4192] ? rcu_lock_release+0x20/0x20 [ 184.559293][ T4192] ? kthread_blkcg+0xd0/0xd0 [ 184.563922][ T4192] ret_from_fork+0x1f/0x30 [ 184.568382][ T4192] [ 184.571755][ T4192] Kernel Offset: disabled [ 184.576264][ T4192] Rebooting in 86400 seconds..