2021/03/14 17:48:32 fetching corpus: 20300, signal 843214/967686 (executing program) 2021/03/14 17:48:32 fetching corpus: 20350, signal 843651/968033 (executing program) 2021/03/14 17:48:32 fetching corpus: 20400, signal 844149/968448 (executing program) 2021/03/14 17:48:32 fetching corpus: 20450, signal 844666/968820 (executing program) 2021/03/14 17:48:33 fetching corpus: 20500, signal 845239/969226 (executing program) 2021/03/14 17:48:33 fetching corpus: 20550, signal 845824/969608 (executing program) 2021/03/14 17:48:33 fetching corpus: 20600, signal 846683/970057 (executing program) 2021/03/14 17:48:33 fetching corpus: 20650, signal 847334/970445 (executing program) 2021/03/14 17:48:33 fetching corpus: 20700, signal 847845/970825 (executing program) 2021/03/14 17:48:33 fetching corpus: 20750, signal 848371/971176 (executing program) 2021/03/14 17:48:33 fetching corpus: 20800, signal 848982/971549 (executing program) 2021/03/14 17:48:33 fetching corpus: 20850, signal 849452/971937 (executing program) 2021/03/14 17:48:33 fetching corpus: 20900, signal 849833/972288 (executing program) 2021/03/14 17:48:33 fetching corpus: 20950, signal 850680/972682 (executing program) 2021/03/14 17:48:34 fetching corpus: 21000, signal 851264/973040 (executing program) 2021/03/14 17:48:34 fetching corpus: 21050, signal 852001/973448 (executing program) 2021/03/14 17:48:34 fetching corpus: 21100, signal 852635/973829 (executing program) 2021/03/14 17:48:34 fetching corpus: 21150, signal 853281/974230 (executing program) 2021/03/14 17:48:34 fetching corpus: 21200, signal 854598/974713 (executing program) 2021/03/14 17:48:34 fetching corpus: 21250, signal 855116/975062 (executing program) 2021/03/14 17:48:34 fetching corpus: 21300, signal 855799/975460 (executing program) 2021/03/14 17:48:34 fetching corpus: 21350, signal 856409/975801 (executing program) 2021/03/14 17:48:34 fetching corpus: 21400, signal 856842/976122 (executing program) 2021/03/14 17:48:34 fetching corpus: 21450, signal 857487/976477 (executing program) 2021/03/14 17:48:35 fetching corpus: 21500, signal 858118/976834 (executing program) 2021/03/14 17:48:35 fetching corpus: 21550, signal 858750/977175 (executing program) 2021/03/14 17:48:35 fetching corpus: 21600, signal 859310/977489 (executing program) 2021/03/14 17:48:35 fetching corpus: 21650, signal 859857/977847 (executing program) 2021/03/14 17:48:35 fetching corpus: 21700, signal 860326/978198 (executing program) 2021/03/14 17:48:35 fetching corpus: 21750, signal 860843/978543 (executing program) 2021/03/14 17:48:35 fetching corpus: 21800, signal 861308/978884 (executing program) 2021/03/14 17:48:35 fetching corpus: 21850, signal 861725/979203 (executing program) 2021/03/14 17:48:35 fetching corpus: 21900, signal 862520/979573 (executing program) 2021/03/14 17:48:36 fetching corpus: 21950, signal 863264/979925 (executing program) 2021/03/14 17:48:36 fetching corpus: 22000, signal 863683/980246 (executing program) 2021/03/14 17:48:36 fetching corpus: 22050, signal 864099/980560 (executing program) 2021/03/14 17:48:36 fetching corpus: 22100, signal 864836/980922 (executing program) 2021/03/14 17:48:36 fetching corpus: 22150, signal 865499/981264 (executing program) 2021/03/14 17:48:36 fetching corpus: 22200, signal 866312/981624 (executing program) 2021/03/14 17:48:36 fetching corpus: 22250, signal 867165/981954 (executing program) 2021/03/14 17:48:36 fetching corpus: 22300, signal 867520/982234 (executing program) 2021/03/14 17:48:36 fetching corpus: 22350, signal 868674/982596 (executing program) 2021/03/14 17:48:36 fetching corpus: 22400, signal 869108/982882 (executing program) 2021/03/14 17:48:36 fetching corpus: 22450, signal 869565/983154 (executing program) 2021/03/14 17:48:37 fetching corpus: 22500, signal 870169/983549 (executing program) 2021/03/14 17:48:37 fetching corpus: 22550, signal 870551/983832 (executing program) 2021/03/14 17:48:37 fetching corpus: 22600, signal 870917/984101 (executing program) 2021/03/14 17:48:37 fetching corpus: 22650, signal 871229/984338 (executing program) 2021/03/14 17:48:37 fetching corpus: 22700, signal 871749/984638 (executing program) 2021/03/14 17:48:37 fetching corpus: 22750, signal 872164/984943 (executing program) 2021/03/14 17:48:37 fetching corpus: 22800, signal 872617/985232 (executing program) 2021/03/14 17:48:37 fetching corpus: 22850, signal 873201/985515 (executing program) 2021/03/14 17:48:37 fetching corpus: 22900, signal 873820/985797 (executing program) 2021/03/14 17:48:38 fetching corpus: 22950, signal 874383/986102 (executing program) 2021/03/14 17:48:38 fetching corpus: 23000, signal 874975/986371 (executing program) 2021/03/14 17:48:38 fetching corpus: 23050, signal 875556/986659 (executing program) 2021/03/14 17:48:38 fetching corpus: 23100, signal 875878/986912 (executing program) 2021/03/14 17:48:38 fetching corpus: 23150, signal 876339/987172 (executing program) 2021/03/14 17:48:38 fetching corpus: 23200, signal 876726/987420 (executing program) 2021/03/14 17:48:38 fetching corpus: 23250, signal 877150/987676 (executing program) 2021/03/14 17:48:38 fetching corpus: 23300, signal 877672/987949 (executing program) 2021/03/14 17:48:38 fetching corpus: 23350, signal 878174/988231 (executing program) 2021/03/14 17:48:38 fetching corpus: 23400, signal 878613/988485 (executing program) 2021/03/14 17:48:39 fetching corpus: 23450, signal 879139/988767 (executing program) 2021/03/14 17:48:39 fetching corpus: 23500, signal 879581/989046 (executing program) 2021/03/14 17:48:39 fetching corpus: 23550, signal 880082/989294 (executing program) 2021/03/14 17:48:39 fetching corpus: 23600, signal 880481/989549 (executing program) 2021/03/14 17:48:39 fetching corpus: 23650, signal 881260/989822 (executing program) 2021/03/14 17:48:39 fetching corpus: 23700, signal 881695/990078 (executing program) 2021/03/14 17:48:39 fetching corpus: 23750, signal 881967/990304 (executing program) 2021/03/14 17:48:39 fetching corpus: 23800, signal 882256/990528 (executing program) 2021/03/14 17:48:39 fetching corpus: 23850, signal 882667/990758 (executing program) 2021/03/14 17:48:40 fetching corpus: 23900, signal 883356/991015 (executing program) 2021/03/14 17:48:40 fetching corpus: 23950, signal 883968/991257 (executing program) 2021/03/14 17:48:40 fetching corpus: 24000, signal 884656/991521 (executing program) 2021/03/14 17:48:40 fetching corpus: 24050, signal 885459/991756 (executing program) 2021/03/14 17:48:40 fetching corpus: 24100, signal 885924/992004 (executing program) 2021/03/14 17:48:40 fetching corpus: 24150, signal 886386/992249 (executing program) 2021/03/14 17:48:40 fetching corpus: 24200, signal 886800/992474 (executing program) 2021/03/14 17:48:40 fetching corpus: 24250, signal 887301/992711 (executing program) 2021/03/14 17:48:40 fetching corpus: 24300, signal 887602/992931 (executing program) 2021/03/14 17:48:41 fetching corpus: 24350, signal 888006/993168 (executing program) 2021/03/14 17:48:41 fetching corpus: 24400, signal 888577/993384 (executing program) 2021/03/14 17:48:41 fetching corpus: 24450, signal 889197/993619 (executing program) 2021/03/14 17:48:41 fetching corpus: 24500, signal 889780/993816 (executing program) 2021/03/14 17:48:41 fetching corpus: 24550, signal 890717/994019 (executing program) 2021/03/14 17:48:41 fetching corpus: 24600, signal 891127/994202 (executing program) 2021/03/14 17:48:41 fetching corpus: 24650, signal 891508/994203 (executing program) 2021/03/14 17:48:41 fetching corpus: 24700, signal 891979/994203 (executing program) 2021/03/14 17:48:41 fetching corpus: 24750, signal 892242/994203 (executing program) 2021/03/14 17:48:41 fetching corpus: 24800, signal 892738/994203 (executing program) 2021/03/14 17:48:42 fetching corpus: 24850, signal 893208/994203 (executing program) 2021/03/14 17:48:42 fetching corpus: 24900, signal 893632/994205 (executing program) 2021/03/14 17:48:42 fetching corpus: 24950, signal 893863/994206 (executing program) 2021/03/14 17:48:42 fetching corpus: 25000, signal 894541/994206 (executing program) 2021/03/14 17:48:42 fetching corpus: 25050, signal 894937/994206 (executing program) 2021/03/14 17:48:42 fetching corpus: 25100, signal 895267/994206 (executing program) 2021/03/14 17:48:42 fetching corpus: 25150, signal 895761/994207 (executing program) 2021/03/14 17:48:42 fetching corpus: 25200, signal 896149/994217 (executing program) 2021/03/14 17:48:42 fetching corpus: 25250, signal 896598/994223 (executing program) 2021/03/14 17:48:42 fetching corpus: 25300, signal 897289/994224 (executing program) 2021/03/14 17:48:42 fetching corpus: 25350, signal 897887/994224 (executing program) 2021/03/14 17:48:43 fetching corpus: 25400, signal 898196/994224 (executing program) 2021/03/14 17:48:43 fetching corpus: 25450, signal 898422/994225 (executing program) 2021/03/14 17:48:43 fetching corpus: 25500, signal 898829/994229 (executing program) 2021/03/14 17:48:43 fetching corpus: 25550, signal 899269/994239 (executing program) 2021/03/14 17:48:43 fetching corpus: 25600, signal 899682/994239 (executing program) 2021/03/14 17:48:43 fetching corpus: 25650, signal 900128/994241 (executing program) 2021/03/14 17:48:43 fetching corpus: 25700, signal 900488/994243 (executing program) 2021/03/14 17:48:43 fetching corpus: 25750, signal 900942/994243 (executing program) 2021/03/14 17:48:43 fetching corpus: 25800, signal 901407/994249 (executing program) 2021/03/14 17:48:43 fetching corpus: 25850, signal 901866/994249 (executing program) 2021/03/14 17:48:44 fetching corpus: 25900, signal 902270/994249 (executing program) 2021/03/14 17:48:44 fetching corpus: 25950, signal 902766/994305 (executing program) 2021/03/14 17:48:44 fetching corpus: 26000, signal 903349/994307 (executing program) 2021/03/14 17:48:44 fetching corpus: 26050, signal 903773/994310 (executing program) 2021/03/14 17:48:44 fetching corpus: 26100, signal 904133/994310 (executing program) 2021/03/14 17:48:44 fetching corpus: 26150, signal 904623/994310 (executing program) 2021/03/14 17:48:44 fetching corpus: 26200, signal 905087/994313 (executing program) 2021/03/14 17:48:44 fetching corpus: 26250, signal 905727/994313 (executing program) 2021/03/14 17:48:44 fetching corpus: 26300, signal 906052/994314 (executing program) 2021/03/14 17:48:45 fetching corpus: 26350, signal 906628/994346 (executing program) 2021/03/14 17:48:45 fetching corpus: 26400, signal 907016/994346 (executing program) 2021/03/14 17:48:45 fetching corpus: 26450, signal 907349/994346 (executing program) 2021/03/14 17:48:45 fetching corpus: 26500, signal 907928/994348 (executing program) 2021/03/14 17:48:45 fetching corpus: 26550, signal 908326/994348 (executing program) 2021/03/14 17:48:45 fetching corpus: 26600, signal 908846/994348 (executing program) 2021/03/14 17:48:45 fetching corpus: 26650, signal 909283/994351 (executing program) 2021/03/14 17:48:45 fetching corpus: 26700, signal 909678/994351 (executing program) 2021/03/14 17:48:45 fetching corpus: 26750, signal 910044/994355 (executing program) 2021/03/14 17:48:46 fetching corpus: 26800, signal 910548/994355 (executing program) 2021/03/14 17:48:46 fetching corpus: 26850, signal 910781/994355 (executing program) 2021/03/14 17:48:46 fetching corpus: 26900, signal 911463/994359 (executing program) 2021/03/14 17:48:46 fetching corpus: 26950, signal 911867/994377 (executing program) 2021/03/14 17:48:46 fetching corpus: 27000, signal 912400/994377 (executing program) 2021/03/14 17:48:46 fetching corpus: 27050, signal 913063/994378 (executing program) 2021/03/14 17:48:46 fetching corpus: 27100, signal 913720/994380 (executing program) 2021/03/14 17:48:46 fetching corpus: 27150, signal 914223/994380 (executing program) 2021/03/14 17:48:46 fetching corpus: 27200, signal 914584/994383 (executing program) 2021/03/14 17:48:46 fetching corpus: 27250, signal 915135/994398 (executing program) 2021/03/14 17:48:47 fetching corpus: 27300, signal 915607/994398 (executing program) 2021/03/14 17:48:47 fetching corpus: 27350, signal 916006/994404 (executing program) 2021/03/14 17:48:47 fetching corpus: 27400, signal 916465/994404 (executing program) 2021/03/14 17:48:47 fetching corpus: 27450, signal 916879/994405 (executing program) 2021/03/14 17:48:47 fetching corpus: 27500, signal 917185/994406 (executing program) 2021/03/14 17:48:47 fetching corpus: 27550, signal 917489/994406 (executing program) 2021/03/14 17:48:47 fetching corpus: 27600, signal 917937/994407 (executing program) 2021/03/14 17:48:47 fetching corpus: 27650, signal 918350/994408 (executing program) 2021/03/14 17:48:47 fetching corpus: 27700, signal 918789/994408 (executing program) 2021/03/14 17:48:48 fetching corpus: 27750, signal 919110/994412 (executing program) 2021/03/14 17:48:48 fetching corpus: 27800, signal 919642/994412 (executing program) 2021/03/14 17:48:48 fetching corpus: 27850, signal 920039/994418 (executing program) 2021/03/14 17:48:48 fetching corpus: 27900, signal 920403/994421 (executing program) 2021/03/14 17:48:48 fetching corpus: 27950, signal 920773/994421 (executing program) 2021/03/14 17:48:48 fetching corpus: 28000, signal 921060/994421 (executing program) 2021/03/14 17:48:48 fetching corpus: 28050, signal 921309/994428 (executing program) 2021/03/14 17:48:48 fetching corpus: 28100, signal 921665/994428 (executing program) 2021/03/14 17:48:48 fetching corpus: 28150, signal 922165/994429 (executing program) 2021/03/14 17:48:48 fetching corpus: 28200, signal 922525/994429 (executing program) 2021/03/14 17:48:48 fetching corpus: 28250, signal 922988/994429 (executing program) 2021/03/14 17:48:48 fetching corpus: 28300, signal 923683/994429 (executing program) 2021/03/14 17:48:49 fetching corpus: 28350, signal 923996/994429 (executing program) 2021/03/14 17:48:49 fetching corpus: 28400, signal 924555/994429 (executing program) 2021/03/14 17:48:49 fetching corpus: 28450, signal 924979/994430 (executing program) 2021/03/14 17:48:49 fetching corpus: 28500, signal 925441/994438 (executing program) 2021/03/14 17:48:49 fetching corpus: 28550, signal 925959/994438 (executing program) 2021/03/14 17:48:49 fetching corpus: 28600, signal 926509/994438 (executing program) 2021/03/14 17:48:49 fetching corpus: 28650, signal 926828/994438 (executing program) 2021/03/14 17:48:49 fetching corpus: 28700, signal 927365/994438 (executing program) 2021/03/14 17:48:49 fetching corpus: 28750, signal 927749/994438 (executing program) 2021/03/14 17:48:49 fetching corpus: 28800, signal 928415/994444 (executing program) 2021/03/14 17:48:49 fetching corpus: 28850, signal 928774/994447 (executing program) 2021/03/14 17:48:50 fetching corpus: 28900, signal 929174/994448 (executing program) 2021/03/14 17:48:50 fetching corpus: 28950, signal 929564/994448 (executing program) 2021/03/14 17:48:50 fetching corpus: 29000, signal 929920/994448 (executing program) 2021/03/14 17:48:50 fetching corpus: 29050, signal 930148/994448 (executing program) 2021/03/14 17:48:50 fetching corpus: 29100, signal 930678/994450 (executing program) 2021/03/14 17:48:50 fetching corpus: 29150, signal 931220/994450 (executing program) 2021/03/14 17:48:50 fetching corpus: 29200, signal 931540/994450 (executing program) 2021/03/14 17:48:50 fetching corpus: 29250, signal 931935/994451 (executing program) 2021/03/14 17:48:50 fetching corpus: 29300, signal 932175/994452 (executing program) 2021/03/14 17:48:51 fetching corpus: 29350, signal 932565/994452 (executing program) 2021/03/14 17:48:51 fetching corpus: 29400, signal 932946/994452 (executing program) 2021/03/14 17:48:51 fetching corpus: 29450, signal 933278/994452 (executing program) 2021/03/14 17:48:51 fetching corpus: 29500, signal 933564/994454 (executing program) 2021/03/14 17:48:51 fetching corpus: 29550, signal 933969/994454 (executing program) 2021/03/14 17:48:51 fetching corpus: 29600, signal 934274/994454 (executing program) 2021/03/14 17:48:51 fetching corpus: 29650, signal 934718/994460 (executing program) 2021/03/14 17:48:51 fetching corpus: 29700, signal 934922/994462 (executing program) 2021/03/14 17:48:51 fetching corpus: 29750, signal 935263/994462 (executing program) 2021/03/14 17:48:51 fetching corpus: 29800, signal 935773/994476 (executing program) 2021/03/14 17:48:52 fetching corpus: 29850, signal 936272/994476 (executing program) 2021/03/14 17:48:52 fetching corpus: 29900, signal 936592/994476 (executing program) 2021/03/14 17:48:52 fetching corpus: 29950, signal 936935/994477 (executing program) 2021/03/14 17:48:52 fetching corpus: 30000, signal 937418/994477 (executing program) 2021/03/14 17:48:52 fetching corpus: 30050, signal 937737/994478 (executing program) 2021/03/14 17:48:52 fetching corpus: 30100, signal 938146/994478 (executing program) 2021/03/14 17:48:52 fetching corpus: 30150, signal 938711/994478 (executing program) 2021/03/14 17:48:52 fetching corpus: 30200, signal 939002/994478 (executing program) 2021/03/14 17:48:52 fetching corpus: 30250, signal 939819/994478 (executing program) 2021/03/14 17:48:52 fetching corpus: 30300, signal 940304/994478 (executing program) 2021/03/14 17:48:52 fetching corpus: 30350, signal 940555/994478 (executing program) 2021/03/14 17:48:53 fetching corpus: 30400, signal 940923/994478 (executing program) 2021/03/14 17:48:53 fetching corpus: 30450, signal 941260/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30500, signal 941755/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30550, signal 942199/994517 (executing program) [ 132.668079][ T3240] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.674428][ T3240] ieee802154 phy1 wpan1: encryption failed: -22 2021/03/14 17:48:53 fetching corpus: 30600, signal 942738/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30650, signal 943142/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30700, signal 943396/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30750, signal 943659/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30800, signal 944165/994517 (executing program) 2021/03/14 17:48:53 fetching corpus: 30850, signal 944514/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 30900, signal 944834/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 30950, signal 945353/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 31000, signal 945759/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 31050, signal 946130/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 31100, signal 946672/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 31150, signal 946854/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 31200, signal 947403/994517 (executing program) 2021/03/14 17:48:54 fetching corpus: 31250, signal 947651/994520 (executing program) 2021/03/14 17:48:55 fetching corpus: 31300, signal 947939/994520 (executing program) 2021/03/14 17:48:55 fetching corpus: 31350, signal 948305/994520 (executing program) 2021/03/14 17:48:55 fetching corpus: 31400, signal 948725/994527 (executing program) 2021/03/14 17:48:55 fetching corpus: 31450, signal 949108/994527 (executing program) 2021/03/14 17:48:55 fetching corpus: 31500, signal 949525/994529 (executing program) 2021/03/14 17:48:55 fetching corpus: 31550, signal 949899/994529 (executing program) 2021/03/14 17:48:55 fetching corpus: 31600, signal 950099/994529 (executing program) 2021/03/14 17:48:55 fetching corpus: 31650, signal 950464/994532 (executing program) 2021/03/14 17:48:55 fetching corpus: 31700, signal 950752/994532 (executing program) 2021/03/14 17:48:55 fetching corpus: 31750, signal 951183/994550 (executing program) 2021/03/14 17:48:55 fetching corpus: 31800, signal 951622/994550 (executing program) 2021/03/14 17:48:56 fetching corpus: 31850, signal 951946/994550 (executing program) 2021/03/14 17:48:56 fetching corpus: 31900, signal 952271/994550 (executing program) 2021/03/14 17:48:56 fetching corpus: 31950, signal 952565/994550 (executing program) 2021/03/14 17:48:56 fetching corpus: 32000, signal 952849/994550 (executing program) 2021/03/14 17:48:56 fetching corpus: 32050, signal 955609/994572 (executing program) 2021/03/14 17:48:56 fetching corpus: 32100, signal 955968/994574 (executing program) 2021/03/14 17:48:56 fetching corpus: 32150, signal 956970/994574 (executing program) 2021/03/14 17:48:56 fetching corpus: 32200, signal 957437/994577 (executing program) 2021/03/14 17:48:56 fetching corpus: 32250, signal 957892/994579 (executing program) 2021/03/14 17:48:56 fetching corpus: 32300, signal 958168/994580 (executing program) 2021/03/14 17:48:56 fetching corpus: 32350, signal 958545/994580 (executing program) 2021/03/14 17:48:57 fetching corpus: 32400, signal 958903/994582 (executing program) 2021/03/14 17:48:57 fetching corpus: 32450, signal 959358/994591 (executing program) 2021/03/14 17:48:57 fetching corpus: 32500, signal 959806/994592 (executing program) 2021/03/14 17:48:57 fetching corpus: 32550, signal 960005/994592 (executing program) 2021/03/14 17:48:57 fetching corpus: 32600, signal 960350/994592 (executing program) 2021/03/14 17:48:57 fetching corpus: 32650, signal 960632/994592 (executing program) 2021/03/14 17:48:57 fetching corpus: 32700, signal 961310/994592 (executing program) 2021/03/14 17:48:57 fetching corpus: 32750, signal 961637/994592 (executing program) 2021/03/14 17:48:57 fetching corpus: 32800, signal 962232/994593 (executing program) 2021/03/14 17:48:57 fetching corpus: 32850, signal 962550/994593 (executing program) 2021/03/14 17:48:57 fetching corpus: 32900, signal 962943/994596 (executing program) 2021/03/14 17:48:58 fetching corpus: 32950, signal 963349/994598 (executing program) 2021/03/14 17:48:58 fetching corpus: 33000, signal 963773/994598 (executing program) 2021/03/14 17:48:58 fetching corpus: 33050, signal 963977/994598 (executing program) 2021/03/14 17:48:58 fetching corpus: 33100, signal 964221/994598 (executing program) 2021/03/14 17:48:58 fetching corpus: 33150, signal 964892/994598 (executing program) 2021/03/14 17:48:58 fetching corpus: 33200, signal 965269/994598 (executing program) 2021/03/14 17:48:58 fetching corpus: 33250, signal 965885/994602 (executing program) 2021/03/14 17:48:58 fetching corpus: 33300, signal 966083/994603 (executing program) 2021/03/14 17:48:58 fetching corpus: 33350, signal 966465/994606 (executing program) 2021/03/14 17:48:59 fetching corpus: 33400, signal 966889/994608 (executing program) 2021/03/14 17:48:59 fetching corpus: 33450, signal 967153/994610 (executing program) 2021/03/14 17:48:59 fetching corpus: 33500, signal 967522/994610 (executing program) 2021/03/14 17:48:59 fetching corpus: 33550, signal 967915/994624 (executing program) 2021/03/14 17:48:59 fetching corpus: 33600, signal 968252/994624 (executing program) 2021/03/14 17:48:59 fetching corpus: 33650, signal 968607/994636 (executing program) 2021/03/14 17:48:59 fetching corpus: 33700, signal 969015/994642 (executing program) 2021/03/14 17:48:59 fetching corpus: 33750, signal 969276/994642 (executing program) 2021/03/14 17:48:59 fetching corpus: 33800, signal 969573/994643 (executing program) 2021/03/14 17:48:59 fetching corpus: 33850, signal 970064/994643 (executing program) 2021/03/14 17:49:00 fetching corpus: 33900, signal 970518/994664 (executing program) 2021/03/14 17:49:00 fetching corpus: 33950, signal 970805/994671 (executing program) 2021/03/14 17:49:00 fetching corpus: 34000, signal 971187/994671 (executing program) 2021/03/14 17:49:00 fetching corpus: 34050, signal 971549/994671 (executing program) 2021/03/14 17:49:00 fetching corpus: 34100, signal 971970/994675 (executing program) 2021/03/14 17:49:00 fetching corpus: 34150, signal 972206/994676 (executing program) 2021/03/14 17:49:00 fetching corpus: 34200, signal 972596/994676 (executing program) 2021/03/14 17:49:00 fetching corpus: 34250, signal 972931/994677 (executing program) 2021/03/14 17:49:00 fetching corpus: 34300, signal 973279/994677 (executing program) 2021/03/14 17:49:00 fetching corpus: 34350, signal 973674/994685 (executing program) 2021/03/14 17:49:00 fetching corpus: 34400, signal 974033/994687 (executing program) 2021/03/14 17:49:01 fetching corpus: 34450, signal 974401/994706 (executing program) 2021/03/14 17:49:01 fetching corpus: 34500, signal 975164/994706 (executing program) 2021/03/14 17:49:01 fetching corpus: 34550, signal 975430/994707 (executing program) 2021/03/14 17:49:01 fetching corpus: 34600, signal 975752/994707 (executing program) 2021/03/14 17:49:01 fetching corpus: 34650, signal 976923/994707 (executing program) 2021/03/14 17:49:01 fetching corpus: 34700, signal 977207/994707 (executing program) 2021/03/14 17:49:01 fetching corpus: 34750, signal 977790/994728 (executing program) 2021/03/14 17:49:01 fetching corpus: 34800, signal 978162/994733 (executing program) 2021/03/14 17:49:01 fetching corpus: 34850, signal 978378/994733 (executing program) 2021/03/14 17:49:01 fetching corpus: 34900, signal 978676/994733 (executing program) 2021/03/14 17:49:02 fetching corpus: 34950, signal 978967/994733 (executing program) 2021/03/14 17:49:02 fetching corpus: 35000, signal 979265/994733 (executing program) 2021/03/14 17:49:02 fetching corpus: 35050, signal 979642/994733 (executing program) 2021/03/14 17:49:02 fetching corpus: 35100, signal 979895/994759 (executing program) 2021/03/14 17:49:02 fetching corpus: 35150, signal 980322/994759 (executing program) 2021/03/14 17:49:02 fetching corpus: 35179, signal 980677/994760 (executing program) 2021/03/14 17:49:02 fetching corpus: 35179, signal 980677/994760 (executing program) 2021/03/14 17:49:04 starting 6 fuzzer processes 17:49:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x1, 0x0) writev(r0, &(0x7f0000003800)=[{&(0x7f0000001400)="ab", 0x1}, {0x0, 0x700}, {0x0}, {0x0}], 0x4) 17:49:04 executing program 1: pipe2$9p(&(0x7f0000000040), 0x84000) 17:49:04 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000800)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0xc0481273, 0x0) 17:49:05 executing program 3: socket(0x2, 0x0, 0xffff) 17:49:05 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FIONREAD(r0, 0xc0189436, &(0x7f0000000000)) 17:49:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0ee8189b0729f69b334a", 0xf895}], 0x1) [ 145.035540][ T8439] IPVS: ftp: loaded support on port[0] = 21 [ 145.313089][ T8481] IPVS: ftp: loaded support on port[0] = 21 [ 145.320930][ T8439] chnl_net:caif_netlink_parms(): no params data found [ 145.444421][ T8594] IPVS: ftp: loaded support on port[0] = 21 [ 145.517893][ T8439] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.525008][ T8439] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.534759][ T8439] device bridge_slave_0 entered promiscuous mode [ 145.547905][ T8439] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.554993][ T8439] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.565021][ T8439] device bridge_slave_1 entered promiscuous mode [ 145.663537][ T8439] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 145.693286][ T8439] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 145.722424][ T8439] team0: Port device team_slave_0 added [ 145.733847][ T8713] IPVS: ftp: loaded support on port[0] = 21 [ 145.742889][ T8439] team0: Port device team_slave_1 added [ 145.762735][ T8481] chnl_net:caif_netlink_parms(): no params data found [ 145.824181][ T8439] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 145.832512][ T8439] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.860126][ T8439] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 145.906408][ T8439] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 145.913394][ T8439] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 145.941768][ T8439] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 146.020355][ T8594] chnl_net:caif_netlink_parms(): no params data found [ 146.043339][ T8791] IPVS: ftp: loaded support on port[0] = 21 [ 146.053484][ T8439] device hsr_slave_0 entered promiscuous mode [ 146.063467][ T8439] device hsr_slave_1 entered promiscuous mode [ 146.220037][ T8481] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.227330][ T8481] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.235198][ T8481] device bridge_slave_0 entered promiscuous mode [ 146.260172][ T8481] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.268998][ T8481] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.278596][ T8481] device bridge_slave_1 entered promiscuous mode [ 146.381631][ T8481] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.398314][ T8713] chnl_net:caif_netlink_parms(): no params data found [ 146.418177][ T8481] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.448647][ T8594] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.455729][ T8594] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.464173][ T8594] device bridge_slave_0 entered promiscuous mode [ 146.480995][ T8594] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.488259][ T8594] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.497684][ T8594] device bridge_slave_1 entered promiscuous mode [ 146.633831][ T8481] team0: Port device team_slave_0 added [ 146.664388][ T8594] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.669340][ T9071] IPVS: ftp: loaded support on port[0] = 21 [ 146.712762][ T8481] team0: Port device team_slave_1 added [ 146.729534][ T8594] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.793395][ T8713] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.803951][ T8713] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.815813][ T8713] device bridge_slave_0 entered promiscuous mode [ 146.852685][ T8713] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.860256][ T8713] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.868764][ T8713] device bridge_slave_1 entered promiscuous mode [ 146.879413][ T8594] team0: Port device team_slave_0 added [ 146.906318][ T8713] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.915883][ T8481] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 146.923074][ T8481] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.950325][ T8481] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 146.968081][ T8594] team0: Port device team_slave_1 added [ 146.973962][ T8791] chnl_net:caif_netlink_parms(): no params data found [ 146.987291][ T2945] Bluetooth: hci0: command 0x0409 tx timeout [ 146.991257][ T8439] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 147.009596][ T8713] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.024330][ T8481] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.031879][ T8481] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.058739][ T8481] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.082946][ T8439] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 147.130091][ T8439] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 147.140605][ T8439] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 147.158123][ T8713] team0: Port device team_slave_0 added [ 147.170281][ T8594] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.177818][ T8594] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.204159][ T8594] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.218113][ T8594] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.225071][ T8594] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.252160][ T8594] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.262966][ T37] Bluetooth: hci1: command 0x0409 tx timeout [ 147.284272][ T8713] team0: Port device team_slave_1 added [ 147.318546][ T8481] device hsr_slave_0 entered promiscuous mode [ 147.325883][ T8481] device hsr_slave_1 entered promiscuous mode [ 147.334464][ T8481] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 147.342490][ T8481] Cannot create hsr debugfs directory [ 147.389891][ T8713] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 147.398246][ T8713] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.424809][ T8713] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 147.443863][ T8713] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 147.452292][ T8713] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 147.479213][ T8713] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 147.490595][ T9212] Bluetooth: hci2: command 0x0409 tx timeout [ 147.505207][ T8791] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.513176][ T8791] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.522198][ T8791] device bridge_slave_0 entered promiscuous mode [ 147.532695][ T8791] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.540179][ T8791] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.548795][ T8791] device bridge_slave_1 entered promiscuous mode [ 147.578241][ T8594] device hsr_slave_0 entered promiscuous mode [ 147.587517][ T8594] device hsr_slave_1 entered promiscuous mode [ 147.594041][ T8594] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 147.601748][ T8594] Cannot create hsr debugfs directory [ 147.635783][ T8713] device hsr_slave_0 entered promiscuous mode [ 147.643416][ T8713] device hsr_slave_1 entered promiscuous mode [ 147.650755][ T8713] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 147.659686][ T8713] Cannot create hsr debugfs directory [ 147.691817][ T8791] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 147.706617][ T37] Bluetooth: hci3: command 0x0409 tx timeout [ 147.710099][ T8791] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 147.840214][ T9071] chnl_net:caif_netlink_parms(): no params data found [ 147.908445][ T8791] team0: Port device team_slave_0 added [ 147.917930][ T8791] team0: Port device team_slave_1 added [ 147.956383][ T37] Bluetooth: hci4: command 0x0409 tx timeout [ 148.002815][ T8791] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 148.010618][ T8791] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.036880][ T8791] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 148.081507][ T8791] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 148.089796][ T8791] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.117718][ T8791] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 148.179245][ T8439] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.202697][ T9071] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.216506][ T9071] bridge0: port 1(bridge_slave_0) entered disabled state [ 148.224857][ T9071] device bridge_slave_0 entered promiscuous mode [ 148.238508][ T8791] device hsr_slave_0 entered promiscuous mode [ 148.245147][ T8791] device hsr_slave_1 entered promiscuous mode [ 148.252255][ T8791] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.260534][ T8791] Cannot create hsr debugfs directory [ 148.289178][ T9071] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.296714][ T9071] bridge0: port 2(bridge_slave_1) entered disabled state [ 148.304555][ T9071] device bridge_slave_1 entered promiscuous mode [ 148.356640][ T9071] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 148.375288][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.384542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.397374][ T8439] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.411663][ T9071] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 148.460519][ T9071] team0: Port device team_slave_0 added [ 148.481923][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.493631][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.504702][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.512057][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.532455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.542754][ T9071] team0: Port device team_slave_1 added [ 148.572569][ T9071] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 148.579696][ T9071] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.608273][ T4924] Bluetooth: hci5: command 0x0409 tx timeout [ 148.615631][ T9071] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 148.648773][ T9071] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 148.655745][ T9071] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 148.683137][ T9071] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 148.696732][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.705794][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.715039][ T4924] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.722157][ T4924] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.731008][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.739751][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.794734][ T8481] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 148.803936][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.813295][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.822487][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.832953][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.850400][ T9071] device hsr_slave_0 entered promiscuous mode [ 148.857619][ T9071] device hsr_slave_1 entered promiscuous mode [ 148.864086][ T9071] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 148.871933][ T9071] Cannot create hsr debugfs directory [ 148.879942][ T8481] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 148.889953][ T8481] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 148.900375][ T8481] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 148.913098][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.922214][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.931237][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.968237][ T8439] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.980077][ T8439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.992394][ T9565] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.001832][ T9565] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.047601][ T8594] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 149.066187][ T7] Bluetooth: hci0: command 0x041b tx timeout [ 149.072962][ T8594] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 149.099620][ T8594] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 149.109819][ T8594] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 149.207636][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 149.215191][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 149.250219][ T8439] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.262135][ T8713] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 149.284194][ T8713] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 149.306671][ T3148] Bluetooth: hci1: command 0x041b tx timeout [ 149.338032][ T8713] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 149.391882][ T8791] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 149.412717][ T8713] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 149.450555][ T8481] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.462997][ T8791] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 149.472774][ T8791] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 149.489967][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 149.499489][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 149.522374][ T8439] device veth0_vlan entered promiscuous mode [ 149.540231][ T8791] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 149.559414][ T9725] Bluetooth: hci2: command 0x041b tx timeout [ 149.570221][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 149.578715][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 149.587916][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.595472][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.604148][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 149.612626][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 149.631124][ T8439] device veth1_vlan entered promiscuous mode [ 149.640449][ T8481] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.692986][ T8594] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.704158][ T9071] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 149.725748][ T9071] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 149.735251][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 149.743889][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.752710][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.761501][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.768651][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.776989][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.785488][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.794204][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.801344][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 149.826451][ T9707] Bluetooth: hci3: command 0x041b tx timeout [ 149.828735][ T8594] 8021q: adding VLAN 0 to HW filter on device team0 [ 149.848926][ T9071] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 149.865285][ T9071] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 149.874617][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 149.887157][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.895134][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 149.904139][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 149.912433][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.922881][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.964010][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 149.972806][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 149.982565][ T3148] bridge0: port 1(bridge_slave_0) entered blocking state [ 149.989742][ T3148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 149.998175][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.008081][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.016896][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.025275][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.034295][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.036158][ T9726] Bluetooth: hci4: command 0x041b tx timeout [ 150.043338][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.083534][ T8481] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 150.096541][ T8481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.122974][ T8439] device veth0_macvtap entered promiscuous mode [ 150.136141][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.144100][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.152997][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.162165][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.171262][ T3148] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.178397][ T3148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.188389][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.196778][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.205039][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.214529][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 150.223458][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 150.232435][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.258294][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 150.268248][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 150.275669][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 150.284420][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.293383][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.310690][ T8439] device veth1_macvtap entered promiscuous mode [ 150.341304][ T8791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.354123][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 150.362427][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 150.370673][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.379649][ T4924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.407277][ T8481] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 150.437342][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.445027][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.485278][ T8791] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.495074][ T8439] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 150.509745][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 150.518916][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 150.528486][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 150.538851][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 150.550001][ T8713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 150.581751][ T8439] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 150.593947][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 150.605227][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 150.614406][ T9212] bridge0: port 1(bridge_slave_0) entered blocking state [ 150.621576][ T9212] bridge0: port 1(bridge_slave_0) entered forwarding state [ 150.630731][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 150.640081][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 150.649420][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 150.659214][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 150.670642][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 150.679987][ T9212] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 150.705631][ T8713] 8021q: adding VLAN 0 to HW filter on device team0 [ 150.717958][ T9726] Bluetooth: hci5: command 0x041b tx timeout [ 150.739025][ T8439] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.748772][ T8439] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.765237][ T8439] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.778331][ T8439] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.791987][ T8594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 150.801278][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 150.809922][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 150.818681][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 150.827795][ T9725] bridge0: port 2(bridge_slave_1) entered blocking state [ 150.834845][ T9725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 150.843366][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 150.852553][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 150.860591][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 150.868964][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 150.877657][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 150.902437][ T8481] device veth0_vlan entered promiscuous mode [ 150.936543][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 150.944285][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 150.953467][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 150.962487][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 150.971849][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 150.980608][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 150.990400][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 150.999351][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.008450][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.017484][ T9726] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.024633][ T9726] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.033096][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.041467][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.060461][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.070084][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.103588][ T8791] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 151.115160][ T8791] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.133318][ T9071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 151.147166][ T9735] Bluetooth: hci0: command 0x040f tx timeout [ 151.154365][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 151.162522][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 151.170540][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.179748][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.188732][ T9725] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.195862][ T9725] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.203377][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.212557][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.221595][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.231277][ T9725] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.250216][ T8481] device veth1_vlan entered promiscuous mode [ 151.267615][ T8594] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.294992][ T9071] 8021q: adding VLAN 0 to HW filter on device team0 [ 151.322803][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 151.331609][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.344930][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.354021][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 151.365271][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 151.375216][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 151.383941][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 151.392682][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 151.396402][ T20] Bluetooth: hci1: command 0x040f tx timeout [ 151.401669][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 151.415402][ T9648] bridge0: port 1(bridge_slave_0) entered blocking state [ 151.422686][ T9648] bridge0: port 1(bridge_slave_0) entered forwarding state [ 151.431033][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.439296][ T9648] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 151.489886][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.500275][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.520170][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 151.530455][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 151.540137][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 151.547416][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 151.555334][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 151.564480][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 151.572028][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 151.602560][ T8791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 151.626759][ T37] Bluetooth: hci2: command 0x040f tx timeout [ 151.657422][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.668903][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 151.695580][ T8713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 151.716366][ T8481] device veth0_macvtap entered promiscuous mode [ 151.728649][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 151.738560][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 151.748626][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 151.758213][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 151.768277][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 151.777876][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 151.787074][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 151.796801][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 151.804607][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 151.817818][ T9] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 151.831128][ T8481] device veth1_macvtap entered promiscuous mode [ 151.846826][ T9] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 151.868884][ T9735] Bluetooth: hci3: command 0x040f tx timeout [ 151.890498][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 151.909877][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 151.918798][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 151.928323][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 151.937888][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 151.946725][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 151.954947][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 151.973149][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 152.019562][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 152.028856][ T37] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 152.039673][ T9071] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 152.050443][ T8713] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 152.060080][ T25] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 152.065939][ T2945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.077094][ T25] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 152.081158][ T2945] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.094081][ T2945] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 152.103299][ T2945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.113058][ T2945] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.130339][ T2945] Bluetooth: hci4: command 0x040f tx timeout [ 152.151843][ T8594] device veth0_vlan entered promiscuous mode [ 152.159989][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.169978][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.217388][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.226020][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.234460][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 152.246916][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 152.259489][ T8791] device veth0_vlan entered promiscuous mode [ 152.271536][ T8481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 152.284256][ T8481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.296812][ T8481] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 152.313633][ T8594] device veth1_vlan entered promiscuous mode [ 152.326316][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 152.336868][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.356084][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.363952][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready 17:49:13 executing program 0: syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x342c1) [ 152.396507][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 152.405246][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 152.427210][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 152.448165][ T8481] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 152.466756][ T8481] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 152.481481][ T8481] batman_adv: batadv0: Interface activated: batadv_slave_1 17:49:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000006300)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000004200)={0x18}, 0x18) [ 152.497042][ T9071] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 152.510626][ T8791] device veth1_vlan entered promiscuous mode [ 152.533962][ T8713] device veth0_vlan entered promiscuous mode [ 152.557069][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 152.565174][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 152.587458][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 152.606584][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 152.614883][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 152.639876][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 152.664916][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 152.699484][ T8481] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 17:49:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000a00)={0x0, 0x0, 0xffffffffffffffff}, 0x0) [ 152.735920][ T8481] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.746212][ T2945] Bluetooth: hci5: command 0x040f tx timeout [ 152.760166][ T8481] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.769132][ T8481] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 152.803524][ T8713] device veth1_vlan entered promiscuous mode 17:49:13 executing program 0: r0 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1299}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)) [ 152.925065][ T8791] device veth0_macvtap entered promiscuous mode [ 152.944499][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.965325][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 152.983880][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 152.993093][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.038483][ T8594] device veth0_macvtap entered promiscuous mode 17:49:13 executing program 0: symlinkat(&(0x7f0000000740)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000800)='TIPCv2\x00', 0xffffffffffffffff) setxattr$security_evm(&(0x7f0000000980)='./file0\x00', 0x0, 0x0, 0x0, 0x0) [ 153.084983][ T8791] device veth1_macvtap entered promiscuous mode [ 153.094214][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 153.106441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 153.114659][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.137309][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 153.147630][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 153.184966][ T8594] device veth1_macvtap entered promiscuous mode [ 153.219940][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 17:49:13 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4000011) [ 153.235608][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 153.255351][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 153.279197][ T8713] device veth0_macvtap entered promiscuous mode [ 153.298895][ T2945] Bluetooth: hci0: command 0x0419 tx timeout [ 153.354802][ T9071] device veth0_vlan entered promiscuous mode [ 153.389819][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 153.407302][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 153.426571][ T3148] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 153.438174][ T8713] device veth1_macvtap entered promiscuous mode [ 153.453055][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 153.465956][ T20] Bluetooth: hci1: command 0x0419 tx timeout [ 153.477241][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 17:49:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f0000001040)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001000)={0x0}}, 0x0) [ 153.511561][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 153.535067][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.564115][ T8791] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 153.597625][ T8594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 153.614988][ T8594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.635420][ T8594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 153.654550][ T8594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.676242][ T8594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 153.694111][ T8594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.710963][ T8594] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 153.716656][ T20] Bluetooth: hci2: command 0x0419 tx timeout [ 153.720390][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 153.742119][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 153.750544][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 153.760499][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.773494][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.782551][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 153.792329][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 153.812644][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 153.824352][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.834898][ T8791] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 153.847274][ T8791] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.858772][ T8791] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 153.874426][ T9071] device veth1_vlan entered promiscuous mode [ 153.889574][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 153.898416][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 153.908446][ T8594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 153.919200][ T8594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.929522][ T8594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 153.940379][ T8594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.951661][ T8594] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 153.955704][ T20] Bluetooth: hci3: command 0x0419 tx timeout [ 153.963455][ T8594] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 153.979370][ T8594] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 153.991703][ T8594] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.007115][ T8594] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.019647][ T8594] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.029992][ T8594] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.057954][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.069611][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.079595][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.090123][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.100238][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.112120][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.122052][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.132561][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.144011][ T8713] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 154.151934][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 154.160709][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.170629][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 154.179828][ T9756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 154.190699][ T8791] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.200774][ T9726] Bluetooth: hci4: command 0x0419 tx timeout [ 154.210969][ T223] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.221010][ T8791] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.221379][ T223] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.232612][ T8791] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.254013][ T8791] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.288228][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 154.299856][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.309858][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 154.320359][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.331285][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 154.341751][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.353605][ T8713] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 154.364432][ T8713] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.376352][ T8713] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 154.383799][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 154.393165][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 154.401950][ T9576] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 154.434972][ T8713] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.456504][ T8713] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.474987][ T8713] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.485324][ T8713] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 154.533349][ T9776] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 154.544803][ T9776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 154.604941][ T9071] device veth0_macvtap entered promiscuous mode [ 154.640538][ T134] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.671732][ T9071] device veth1_macvtap entered promiscuous mode [ 154.689674][ T134] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.712855][ T9794] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 154.728340][ T9794] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 154.738682][ T9794] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 154.800728][ T223] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.822847][ T161] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 154.846109][ T9726] Bluetooth: hci5: command 0x0419 tx timeout [ 154.859012][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.875449][ T161] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.883644][ T223] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 154.899483][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.922083][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.939929][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.953112][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.964021][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.974174][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 154.985002][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 154.997817][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 155.008982][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.026102][ T9071] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 155.041316][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 155.057672][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 155.077370][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 155.096382][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 155.108030][ T223] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.124523][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 155.147698][ T223] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:49:15 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x80040) [ 155.155886][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.178650][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 155.189784][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.201538][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 155.213209][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.224549][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 155.245725][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.255566][ T9071] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 155.289848][ T9071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 155.312741][ T9071] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 155.337468][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 155.356194][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 155.395580][ T9726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 155.446150][ T9] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.454290][ T9] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 155.485026][ T9071] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.507193][ T9071] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.527176][ T9071] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.544503][ T9071] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.580618][ T9734] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 155.664076][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.688357][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 155.745157][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 155.822613][ T134] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.852129][ T134] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 155.882073][ T25] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 155.897916][ T25] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 17:49:16 executing program 2: pipe2$9p(0x0, 0x40800) [ 155.903187][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 155.927700][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 156.030895][ T134] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 156.063756][ T134] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 156.093649][ T9776] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 17:49:16 executing program 3: syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x1) 17:49:16 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1) write$nbd(r0, &(0x7f0000000300), 0xfffffdef) 17:49:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)) 17:49:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001580)={&(0x7f0000001400), 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x0, 0x5, "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"}, @ETHTOOL_A_BITSET_SIZE, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "330616bd35d485e5ff0b18efe0fb8dfc64524a47e46f525b8c"}, @ETHTOOL_A_BITSET_SIZE, @ETHTOOL_A_BITSET_MASK={0x0, 0x5, "38a0b72fbdb59c001e4edf17a8412cb0e366e9eef5ba694d5db606c55f351db6757f1e9c6e923b5a3ad743af083844a068ac2373ef8a5f78bbc0f9401c5ac2946cf88847a74f693dff8f50d8a70ee2f7fa0d2eb00dc1031b7d0ac56c40a84d80a059dab116abe510922b68a1fdac7e35968a550e93328e6d66c343aeb9de166f103facbd1796eab911a6e6a6eaa5eaa9f390f481debbe275cbc7bc176a09c74af9ae9f1fcd23e5b4698e6e0c66749e17b8bcca"}, @ETHTOOL_A_BITSET_VALUE={0x0, 0x4, "630cfa5dc830af603151df71bdf33d83099968ef07e6bf01ee72174b86c77bad0a4961ccfc0b03b4121ab3acfb161384ade3135f3c8165dad5a7536ea6c14ddc25da122d011f115f53093f700d85cfabd38a101d68cca165db107db54c7bb931dbf93d4ffd0783c418a35883181d764bc21756350a43ea39f5ec92834c77cfda29a813d9b8cd311e2eb96fef9c9fb37f7fcb76a249519fdc1c42dd3ff7cd9797a998a24f9713369ee19f0402c61b064c52957a2b5ae7c626e1a921d4d8fba3de0051df470d88cc8ed3215b826ca250f238bc5ec0c88a4deacdc516ad2dd339b1f9024cde1074"}, @ETHTOOL_A_BITSET_SIZE]}, @ETHTOOL_A_DEBUG_MSGMASK={0x0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK]}, @ETHTOOL_A_DEBUG_HEADER={0x0, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x0, 0x2, 'virt_wifi0\x00'}]}]}, 0xfffffffffffffc36}}, 0x804) 17:49:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$FUSE(r0, &(0x7f00000015c0)={0x2020}, 0x2020) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000f00)=ANY=[@ANYBLOB="140000008629af", @ANYRES16=0x0, @ANYBLOB], 0x14}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) 17:49:18 executing program 2: syz_open_dev$char_raw(&(0x7f0000000000)='/dev/raw/raw#\x00', 0x0, 0x5d50e1) 17:49:18 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 17:49:18 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 17:49:18 executing program 3: socketpair(0xa, 0x2, 0x0, 0x0) 17:49:18 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCH_MFLUSH(r0, 0x9208, 0x3) 17:49:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={0x0, 0x130c}}, 0x0) 17:49:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000740)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 17:49:18 executing program 1: socketpair(0x11, 0xa, 0x3, 0x0) 17:49:18 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000005e40)=[{{&(0x7f0000003bc0)=@can, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002700)=[{0x1000000000000000, 0x0, &(0x7f00000003c0)=[{0x0}, {&(0x7f0000000140)="0272f8e661d82e2f7a19243ccd5cef7165de1e59931f71baa88f", 0x1a}, {0x0}, {&(0x7f0000002900)="c9", 0x7fffefe6}], 0x2}], 0x7fffefe6, 0x0) 17:49:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1) write$nbd(r1, &(0x7f0000000300), 0xfffffdef) 17:49:18 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0x4240a543) splice(r2, 0x0, r3, 0x0, 0x1, 0xe) 17:49:18 executing program 0: socketpair(0xa, 0x0, 0x200, 0x0) 17:49:18 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140)=0x0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x20, 0xa7, 0x9, 0x7, 0x0, 0x6, 0x4, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2cc, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x40000, 0x4, 0x2, 0xb, 0x80, 0x80, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000380)=ANY=[], 0x8) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000200)={{0x3, r1, r2, r3, r2, 0x408036973fff04ad, 0x4}, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) 17:49:18 executing program 2: syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x0, 0xc00) 17:49:18 executing program 4: syz_open_dev$char_raw(&(0x7f0000000300)='/dev/raw/raw#\x00', 0x0, 0x40280) 17:49:18 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/net\x00') 17:49:18 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000100)=@routing={0x0, 0x0, 0x0, 0x1}, 0x8) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9c, 0x0) [ 157.899011][ C0] hrtimer: interrupt took 43526 ns 17:49:18 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xc000000, 0x43408) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) close(r2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1d, 0x0, 0x0, 0x0, 0x1602, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x5, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) 17:49:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1d, 0x0, 0x0, 0x0, 0x1602, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x5, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) 17:49:19 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 17:49:19 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x20000000002, 0x73) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x541b, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 17:49:19 executing program 3: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x8, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r0, 0x4}, 0x10) close(r1) 17:49:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f000000a100)={0x17, 0x0, 0x0, 0x7ff}, 0x40) 17:49:19 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140)=0x0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x20, 0xa7, 0x9, 0x7, 0x0, 0x6, 0x4, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2cc, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x40000, 0x4, 0x2, 0xb, 0x80, 0x80, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000380)=ANY=[], 0x8) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000200)={{0x3, r1, r2, r3, r2, 0x408036973fff04ad, 0x4}, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) 17:49:19 executing program 5: socketpair(0x2, 0x3, 0xef, &(0x7f0000000000)) 17:49:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = getpid() perf_event_open(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffe01, 0x2, @perf_bp={&(0x7f00000027c0), 0x9}, 0x8024, 0xf0, 0x20, 0x7, 0x150c9019, 0x101, 0xffff}, r0, 0x2, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0xfd, 0xfa, 0x3, 0x0, 0x800, 0x800, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x4000, 0x7fff, 0x6, 0x7, 0x401, 0x6, 0x1}, r1, 0x8, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x20, 0x81, 0x7f, 0x1, 0x0, 0x15, 0x400, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_config_ext={0xbc, 0x6}, 0x4002, 0x3, 0x6, 0x9, 0xffffffffffffff01, 0x6, 0xca}, 0xffffffffffffffff, 0x1, r3, 0x2) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80648c63940d0424fc60020002400a000a00053582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 17:49:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f000000a100)={0x17, 0x0, 0x161, 0x7ff, 0x2}, 0x40) [ 158.884845][T10011] netlink: 212940 bytes leftover after parsing attributes in process `syz-executor.0'. 17:49:19 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f000000a100)={0x17, 0x0, 0x161, 0x7ff, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 17:49:19 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000100)=@routing={0x0, 0x0, 0x0, 0x1}, 0x8) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9c, 0x0) 17:49:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000016880)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) 17:49:19 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = getpid() perf_event_open(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffe01, 0x2, @perf_bp={&(0x7f00000027c0), 0x9}, 0x8024, 0xf0, 0x20, 0x7, 0x150c9019, 0x101, 0xffff}, r0, 0x2, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0xfd, 0xfa, 0x3, 0x0, 0x800, 0x800, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x4000, 0x7fff, 0x6, 0x7, 0x401, 0x6, 0x1}, r1, 0x8, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x20, 0x81, 0x7f, 0x1, 0x0, 0x15, 0x400, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_config_ext={0xbc, 0x6}, 0x4002, 0x3, 0x6, 0x9, 0xffffffffffffff01, 0x6, 0xca}, 0xffffffffffffffff, 0x1, r3, 0x2) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80648c63940d0424fc60020002400a000a00053582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 17:49:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) close(r2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r3, 0x0, 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1d, 0x0, 0x0, 0x0, 0x1602, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x5, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) 17:49:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0xd, 0x43408) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_all\x00', 0x0, 0x0) close(r2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1d, 0x0, 0x0, 0x0, 0x1602, 0xffffffffffffffff, 0x0, [], 0x0, r4, 0x5, 0x1}, 0x40) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) 17:49:20 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x40000d) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x100002, 0x0) close(r1) close(r0) [ 159.336205][T10038] netlink: 212940 bytes leftover after parsing attributes in process `syz-executor.0'. 17:49:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140)=0x0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x20, 0xa7, 0x9, 0x7, 0x0, 0x6, 0x4, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2cc, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x40000, 0x4, 0x2, 0xb, 0x80, 0x80, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000380)=ANY=[], 0x8) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000200)={{0x3, r1, r2, r3, r2, 0x408036973fff04ad, 0x4}, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) 17:49:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 17:49:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248000109, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x6, 0xb9, 0x4, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x2400000000000000}, 0x0, 0x9, 0x400, 0x0, 0x69b, 0x3ff, 0x2}, r1, 0x0, 0xffffffffffffffff, 0xf) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x78) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000000c0)=r2, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000040)=r2, 0x4) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000000)) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x12000005f) 17:49:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = getpid() perf_event_open(&(0x7f0000002800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfffffe01, 0x2, @perf_bp={&(0x7f00000027c0), 0x9}, 0x8024, 0xf0, 0x20, 0x7, 0x150c9019, 0x101, 0xffff}, r0, 0x2, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0xfd, 0xfa, 0x3, 0x0, 0x800, 0x800, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000200), 0x2}, 0x4000, 0x7fff, 0x6, 0x7, 0x401, 0x6, 0x1}, r1, 0x8, 0xffffffffffffffff, 0x8) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40305839, &(0x7f0000000000)) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x20, 0x81, 0x7f, 0x1, 0x0, 0x15, 0x400, 0x6, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_config_ext={0xbc, 0x6}, 0x4002, 0x3, 0x6, 0x9, 0xffffffffffffff01, 0x6, 0xca}, 0xffffffffffffffff, 0x1, r3, 0x2) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80648c63940d0424fc60020002400a000a00053582c137153e370848018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 17:49:20 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f000000a100)={0x17, 0x7, 0x0, 0x7ff}, 0x40) 17:49:20 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0) [ 159.740729][T10066] netlink: 212940 bytes leftover after parsing attributes in process `syz-executor.0'. 17:49:20 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000100)=@routing={0x0, 0x0, 0x0, 0x1}, 0x8) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9c, 0x0) 17:49:20 executing program 3: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x1}, 0x0, 0x0, &(0x7f0000000180)={0x0}) 17:49:20 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, 0x0) 17:49:20 executing program 4: syz_emit_ethernet(0x26, &(0x7f0000000040)={@random="cc4229c0a89e", @dev, @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @dev}}}}}, 0x0) 17:49:20 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = geteuid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000140)=0x0, 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000100)='.pending_reads\x00', 0x0, 0x8) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x20, 0xa7, 0x9, 0x7, 0x0, 0x6, 0x4, 0x6, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2cc, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x40000, 0x4, 0x2, 0xb, 0x80, 0x80, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000380)=ANY=[], 0x8) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000200)={{0x3, r1, r2, r3, r2, 0x408036973fff04ad, 0x4}, 0x4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7f}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0xb605}}], 0xc6, 0x0) 17:49:20 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f00000002c0)={'security\x00', 0x2, [{}, {}]}, 0x48) 17:49:20 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f00000000c0)='?', 0x1}], 0x3}}], 0x1, 0x0) 17:49:20 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43408) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r2) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='freezer.state\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x10, 0x7, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x698d}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x3}]}, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x40f00, 0x1, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x0, 0x2, 0x8}, 0x10, 0xffffffffffffffff}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1d, 0xff, 0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0, [], 0x0, r3, 0x5, 0x0, 0x1}, 0x40) openat$cgroup(r3, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='freezer.state\x00', 0x0, 0x0) 17:49:20 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$nbd(r0, 0x0, 0x0) 17:49:20 executing program 5: request_key(&(0x7f00000002c0)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0) 17:49:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)="15", 0x1}, {0x0}, {&(0x7f00000001c0)="c9", 0x1}], 0x3}, 0x0) 17:49:21 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="6368616e676568617420f2"], 0x40) 17:49:21 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6(0xa, 0x3, 0x2c) setsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000100)=@routing={0x0, 0x0, 0x0, 0x1}, 0x8) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x2bb98205) splice(r0, 0x0, r2, 0x0, 0x4ff9c, 0x0) 17:49:21 executing program 4: setpriority(0x1, 0x0, 0x6a3) 17:49:21 executing program 3: pipe(&(0x7f00000002c0)) socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000002c0)) select(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380)={0xff}, &(0x7f0000000400)) 17:49:21 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) io_setup(0x3d4, &(0x7f00000000c0)=0x0) io_submit(r1, 0x2, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, 0x0]) 17:49:21 executing program 5: mq_open(&(0x7f00000003c0)='clsact\x00', 0x0, 0x0, 0x0) 17:49:21 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000900)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, @tid=0xffffffffffffffff}, 0x0) 17:49:21 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 17:49:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x14) 17:49:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8}]}, 0x10) 17:49:21 executing program 0: syz_emit_ethernet(0x42, &(0x7f0000000300)={@multicast, @link_local, @val={@void}, {@mpls_uc={0x8847, {[], @ipv6=@udp={0x0, 0x6, "c93e2c", 0x8, 0x11, 0x0, @local, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], {0x0, 0x0, 0x8}}}}}}}, 0x0) [ 160.658476][T10105] AppArmor: change_hat: Invalid input 'ò' [ 161.255789][T10128] syz-executor.3 uses obsolete (PF_INET,SOCK_PACKET) 17:49:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x890d}, @CTA_TIMEOUT_DATA={0x4}]}, 0x34}}, 0x0) 17:49:22 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 17:49:22 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:22 executing program 1: syz_emit_ethernet(0x30, &(0x7f0000000000)={@broadcast, @broadcast, @val={@void}, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @local, @ipv4={[], [], @empty}, @remote, @dev}}}}, 0x0) 17:49:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@loopback, @in6=@rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in6=@mcast1}}, 0xe8) 17:49:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}], 0x1, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000001380)={'batadv_slave_0\x00', 0x0}) sendmmsg$inet6(r0, &(0x7f0000001ac0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000140)={0xa, 0x4e23, 0x0, @mcast2, 0x1ff}, 0x1c, 0x0, 0x0, &(0x7f00000013c0)=[@pktinfo={{0x24, 0x29, 0x32, {@empty, r1}}}], 0x28}}], 0x2, 0x0) 17:49:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, 0x0) 17:49:22 executing program 2: syz_open_dev$evdev(&(0x7f00000006c0)='/dev/input/event#\x00', 0x0, 0x6203) 17:49:22 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x15, 0x0, 0x0) 17:49:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000040)={0x7, 'vlan0\x00'}) 17:49:22 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, 0x0) 17:49:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, 0xffffffffffffffff, 0x0) 17:49:22 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x1d1800, 0x0) 17:49:22 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000001c0)="57274c210b406b98e4bd0e1762cf44ebdd89c318b984095cb77a31871b1689fdb7306a84b450682c6b1405174a1e000520fcdfa1db6a16ea0d8c4b7fabd74e51f79d06ae6b10cd947c70ec3a0cbfbe89f18bbf578cd8d7be9c44676e15700c0b96210285be9992e38c70ccb7701aec27324a50c0cd9c7de952eb6234ae1919cbd0d64b9e877c81abcdba2da4dd10a9d9e180", 0x92}, {&(0x7f0000000280)="184e4368b5aec981ae13f7b231f7b715cf97175217b468ef1611bcf5707202bd88f784d0a759a343f68e289a70639c81c654118d448a7e902cd53ef2d9e9f5970c21386a02b2d3506a3766267c05b85978a752421812a459f16b2b0e22dbbb002018cd44a8bcc50621f9d5b913f84434451b9dae51cccc0c976320a7235338f86f7b97094d3a4621ba28019395dc183c463124f4a59df68ce6eaaad9ff8d93fcb75001ef05a0ff58443aa32ec9fd761194eb64d17956308d05bf7ca33f5cf62bc7b53dff9cdafecc8790995685d4f6096f1bffb73f3f960a862462bafc080b4e9562431afe07b42610e9e9c83333b700b5edefe797fe121e71323474a4a670be518f6d2cd5c0e70f27882061cfc3df118409509c72f8899d1e288004f15e6c15eaca50ee659cdaf7e81a9959ff4493578be6aadf94c03ca4bf37fe8642fe0e51af0a1081eeb4cf6dbd43fcdbd09f50f009f5ec4c8352505675651c65b9fe4408bea327e6f355c88e3493c2a66bf18f2e9509a67751eb9cfae4d916d65106db4fcbc34fd6ec3d609b7512dcd1fb54e8fbe30209f4c0b9ee21d8449b46df6e1b02a97b3d7806c968a6d4373b7af02fefa65c6598b6d1af85af2c586bf39e8fe929ca16ded6507a467d639816a4ef60673696609afa0db33ccd11726d231a9e8e7a12ccd37ae9c75aac9383db922480bd5cb7c1ce57201651d326160ae5a7d50f2117a0fa7b3317a9e96cc229d17b5311808ce60bdd1810cda7cdb17aab21274fb7e842a59504e10efaaa2abea207771c05a8cd56c1ba1d0cf4e40f4ce4a9c0112fd474389541c96e55bd8b08d4d2e1868bd35bd7cbae9391e01697257c7f4f91693f4c5ea2fb4dd3ff6a6c184e5d711414a0d6f63e9a5c45de9ff08933196eae17251ada4dd0f52e92890d73863aed87a1a3dc5094606acd8d71b405b5baf0ecf41c1c6c0ba7940958583e6a184b98c794aafcbd568aab22591200455e55ac2f0fbf2aaa407296b6a6a901117fece3c42f4467c52fa31c86dde1843f39f72858d7b22e69e83454d5f7f61206030032dad4ac37c07818e05340963e5cdb20b87d75acb9b1d3f81f6f960dc944d3e21de7a40d7c7174d263a5afa9e966682e717fd836c9e5a7b817dd54376707ff801731bfd3e8f9e5d49aec941f0ce4baaa13c5b268ebe855c86f441ddecdd8801760c1c71dc35ccf9354e7df87f100ac7a429fd81a4187ad8c96a2b96837f8f5405e61157290e9d09a85ebf228eb7009acc986fedef1c45bdb75532ef8394a8977acc539fdcff96f0e0c99eeca8793b585483f37acb45d3f482fd78ad16d8fd6540be1f5ea0968f05ef8eb7fbe74a424178fa08638d2e3b0ac523957ecd4a7b150e5dac51965a1fb2c0e919a7fbfd86286c73390f2943db16c04b8fcf0be553b8edf243cd9bb2329a22376ad3c9258e6711c35844feaafc74180872877d2b94d0a0f5ed9da446f82837dcf9bef79bde363cb47b1bbeb52c1ef18e10847c08d56c896a81639d1c4f35bf5e4efc6a58b229d0e92448ba662e3ac2e468017fb9e093b686f7d733642086b1a426a33e8b27f552782d867183f8fe73d3e54a2b1c37b008cc32bbe251ea0be593d706ae2e31a1c90164a571825edb1a97f951ce78d7880c9cf2ecb35b37f79e869373e451df34988dc9aae36653b387c625779d25b66960cd31293837f0cd2da10ee22f7ea0f25e674214148ac643e32f755ebd6c201952ba4415c2e117e0cf130d8487607c020fffd00dff3b372f05ba01aa7f34612500e69d66d42289e1b3a9229b0f574102c7ad4405846c7cabeab7bcfeba6aaa47e39b0e0810d413a7264da9928bd310ffa3a1f1e038485e2193924799d01f8a9c728fa8b19801bf5de75f5c38d87fa857e216d5a44a2b9f94730eddb02cca98b5578e23e7c4b1f7ac4ff6eddbe74d6bfc1b8dd1b36250a3a27dbb14f3478bc959d3dcc8f54d98d12f38cede83d0919f2ed7f65f9f5a3cdd6b79bad74d872e263314d4fea3251fdf9879d3d9ea101a2388b467b3819b38a7ceebd05480416c535540a50f95e0a06f9901f5ce949797fd6a936e4ed541b310ca2759378251aec2a6e86fce6b12a1947e9292520405ce06fcb1b298232208aecf35f1f291192ff7e6de638fad0d962c17e8a496ba13ba8cc5a8f45158bca8171cef3c5649740cbc91c0d70bf4ac13726c2a92a394390cac1341fbfe8b264bded8cabbcc76ecf6e81f4d5ff3883a480b2f0aad3a33876647e71fab8ed20573188fa9771e681e2c28965a25e471668cc5b1cbede296d5bb31ba78afc32292c1361fb4b27e6af78c2e1ce1f91b860a6a78db8f776a0c9f25c2061e5ee887ba79b7c2ad59434a8cb5fe28895959ecab99628cb9c8a741a63947f71c492db919435aa28ce1d5499400adda0fac3ef6f5cbbf69730283930b7951b5dd6e2b8129e9aed37ce73fe9a0cf57f626c62a31372bbef65dfe6fe5b083509bb85d053ffd618caf069be4207cdd461399a4af5b7e59f03d45c975d6f2f8548074980e73135159a3ee1e1c33dfca13fd82ea2d8990ad6544bdee1e75b814ff1af902fb107f6267559bafe1610069260ecd8601b16c3e2cadebd84043d75908e80f1d5df2c3717700e91c47a967f88b48cdad0252f49f54dc38cc022dbf5f3ef0439e3b68ede338a07978dcacf17ff3154586a7e3f6a6685c6d6e550a3e187bc1bed3e953de688c1c6dc7014a2c19b23485c700708979d7af2209821bca250dd04f6f0da4084b2de59b8788d41c3efeaf854020e27b00ff9a997acdcc970ffcb957d16fa147997e3d148805db2ed4c3358296537919fb08d7924b7b108b4ffe2ffc8665746e049738b1354bf703e6c66570b6f02a5fcd0a0682d076043a9055fa8b5d263a942618dc1daa49b733464d9535743dff2372ea5ba9aca2a3dbcd34a75bc1cf6f4ca1679cadf57070247acbe77ab77e0dc213e0f9f7edb3e72f0765d7c165a923ca0b0d52afee796963cf4fd74b9eca6b98ff896fb58fc66b53f4be343d2f05cf0b1bac34088f05862a7be0ffc74f82e78c504f63332d1d15a9ad9335013401de2fd57f331829d532011637c911b26c13abd98786c9980a98a06400c1d0049915e3a1f9711640619047f2bb580623d06430cdfce9d38e2e5e8f4de9774f4872c3a3a120a45d17d5c548b51ceeb273676a0bc064fdb48e9494f0e0dad1847b1e1de2d1cda620e595f7c6796877895663010dd09151016876e2305bddd2ae9e60097daa6f86e8682a1a14d87a55a6ba442c06538f8bde914d5520950c1af3510557d8c2466742e996537323c35b6d7602f69afba7c58b0ddb2103750674348ff76b7f4eb2e785ec0e20b4752b0f8c60c1278dba48432c15b56c51b85fc46f5a11ddbcf2a3677dc1b3a63567e2312e6ab8a66c70505a2226f4bdab2986ea02c2600259e3b5db13248e1d8ecfbc60bb02e57e0c5c836b1b586dbc8b0a0e36e67fb52f8512ea70a3114172813bacce7ee2678da5487e324d286e20ef76e2fee6319cbe57696e7662a02b1fde72532efdf72c696a0c0d8e12a22203ddc486cbc29bc735c287dcc2b4b5c8b0aeb315509894fba787ba70efbfa301501cc449a7d6970a6b5c3bc63ce88a3c93212efb5322df70eb1a7d4508f1b634b12a1181c237066b9bb574909413e47c6c29f3ca9eb156da1f52e199e8a2be0a11936153bfd1c2fa710b323458fac6f4ef07c9ea772b24ba5738794545b80be038c11a7fa65ca2ab655d969655fd75dcf8b2af5d8548ad493550a74e4d1410759f636a1f4e02edd9f547d40cfe5f92a72938670101a170c022163aedbdc8c70bbd24e4977dd66436af8919bf234984b1c18bdad159d5a0db4e1f1e729ff0697c95674f7fe9fd84a17299417c86b142ae889cd076ba4e7919191ea6cca1937fb5c4cd61a764630fc55c4ee94f15a7e7d4232a058d988e2ebf630f5a1e966acf5e7914af74f56521aaef59812b872011435942d82c4fcbb70b3b395925a9bb06e8bbd11aa64aab95a3149c3b219220d77b7d7636f044459e70675c1a624512b8796d5cf4c55f19df74bcf11097cade48b5c08b0be8ed1644d408519c8345b171b9353ae5ac99059b3e3801a8003dadd22605114b601660a0cea1b8dd2274f73adb0d9dceca40e64df521f7a70e9136aa63f8b326c58cc405e464f0efa9980c3ac3ba9e4eeb358198ec3f70d9127399c6f7c0224fe413eea79bb469c15ceb490ef11379ebaf40a3e78e9830b285e061b40fa20d59809e44b62b1de2f9ab9ebdb60049b213ba797cae8b630cc481dfc6219d448489d26277487dd1a8c2445a6e05a46f3d384c6408335e4475e9dab1a7ac31dfb4c17df3d7ccbf4027d7b368af8e3232d035d71281686552a4a7cf8849d626b72e34499431d80f1d2099c9343442db4941fd02c2d00cd442ef38ed26faeb79281072556de40576fc6761f0477def98d294d4a3bf7410b0303417d96bdfee14da543648cf78867658a546b101e3d2934016a31da72ccc3c84165971365973a6f4f1585d7ba7b06d4813919fb15f30cc075a16e6a75fbe76ffa73538a45f0119db8488c6066a4bf014b8c61eda8f8a0fb8da91e640c69a0ce95af0275a511607a3b2d760e7edfd2cdf3f8f0faa00d743731c2ca7838c2eab72f1fff7fb3154df48b0b3255bfa3cd0a19dea724aa6d1dec2292bf7a8c6adf7f6eb67e59def2fd7204a1e821214e3817d52e889cb2b2441992f24ab7b78893f5891a45e64bb5e16df0346e0159b9a7183f9615963080f9ae428d5a8ac9407244df66faf612c1876055ecf8580f18f6fd3ad0ddf47e649649dc79567ba8f9ee4c08d92e92068b138ebaab1247f667f4be98959c18462b899f5e4fa70f4551b9b0293d6e8d1d96f50098716e75345ad23989e889e83fec2d0f3f9c6b7774b1c7d5e68ab6c6dfa0501470332f3fcec23b6c89c2a7afa16083654b12111db91a873f1bcb903ccaca58f21044ab856e1953bc5b67d752e852c2395727d185735e32f14764e20364464c006a9d1a96b997093ac629b87f425f50f7d879bf8b6f4d67c518ab05e1c119e91f1021d4fe640526251c848433eacd033510be95f3609937bc22fe8d8eb8f3ac65ef2afb2f021a39", 0xe2f}], 0x2}}], 0x1, 0x0) 17:49:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x7, 0x6, 0x5}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000003080)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/7, 0x7}, {&(0x7f00000000c0)=""/13, 0xd}], 0x2}}], 0x1, 0x0, 0x0) 17:49:23 executing program 1: getitimer(0x0, &(0x7f0000000000)) getitimer(0x0, &(0x7f0000000080)) 17:49:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 17:49:23 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') 17:49:23 executing program 3: r0 = creat(&(0x7f0000000480)='./file0\x00', 0x0) write$tun(r0, &(0x7f00000004c0)={@val, @void, @mpls={[], @ipv4=@igmp={{0x5, 0x4, 0x0, 0x0, 0xffd, 0x0, 0x0, 0x0, 0x2, 0x0, @private, @empty}, {0x0, 0x0, 0x0, @local, "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"}}}}, 0x1001) 17:49:23 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, 0x0) 17:49:23 executing program 0: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 17:49:23 executing program 4: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) 17:49:23 executing program 1: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000001280)='<', 0x1, 0xfffffffffffffffd) 17:49:23 executing program 3: mknodat$null(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x201, 0x0) 17:49:23 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@dev, @local, @private0, 0x0, 0xac}) 17:49:23 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000000)='./file0\x00', r0, 0x0) 17:49:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000540)=[{{&(0x7f0000000040)={0xa, 0x4e1f, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="7f", 0x1}], 0x1, 0x0, 0x4b}}, {}], 0x3, 0x0) 17:49:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x400c001) 17:49:23 executing program 2: clock_gettime(0x1, &(0x7f00000000c0)) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 17:49:23 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, r0) 17:49:23 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) flistxattr(r0, 0x0, 0x0) 17:49:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f0000000180)=0xffffffffffffff01) 17:49:23 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, 0x0, 0x0) 17:49:23 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x4) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, 0x1c, 0x0}}], 0x1, 0x0) 17:49:23 executing program 4: timer_create(0x3, 0x0, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f00000003c0)={{0x0, 0x989680}, {0x0, r0+10000000}}, &(0x7f0000000400)) 17:49:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, 0x0, 0x0) 17:49:23 executing program 1: timer_create(0x3, 0x0, &(0x7f0000000200)) timer_delete(0x0) 17:49:23 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000040)='fscrypt-provisioning\x00', 0x0, 0x0, 0xffffffffffffff50, 0xfffffffffffffffc) 17:49:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 17:49:23 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, &(0x7f0000001040)) 17:49:23 executing program 4: bpf$OBJ_GET_PROG(0x7, 0x0, 0x5) 17:49:24 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000002c0)={@ipv4={[], [], @multicast1}}, 0x14) 17:49:24 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x3, 0x201}, 0x14}}, 0x0) 17:49:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x2, 0x0, &(0x7f0000000180)) 17:49:24 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000580), 0x4) 17:49:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x2e8, 0x108, 0xffffffff, 0xffffffff, 0x108, 0xffffffff, 0x2f0, 0xffffffff, 0xffffffff, 0x2f0, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'macvlan0\x00', 'wlan1\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@ip={@multicast2, @loopback, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1\x00', {}, {}, 0x0, 0x0, 0xe5}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:initrc_exec_t:s0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 17:49:24 executing program 4: syz_emit_ethernet(0x6a, &(0x7f0000000080)={@multicast, @random="24fa7a3a029f", @val={@void}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast1}}}}}, 0x0) 17:49:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000006c0)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) 17:49:24 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='changehat 0x0000000000000002^b'], 0x40) 17:49:24 executing program 1: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) 17:49:24 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, 0x0) 17:49:24 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x8, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 163.730204][ T38] audit: type=1400 audit(1615744164.382:2): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10250 comm="syz-executor.3" 17:49:24 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') 17:49:24 executing program 1: ioperm(0x0, 0x3, 0x0) 17:49:24 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x2, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_CFG_PARAMS={0x9}]}, 0x20}}, 0x0) 17:49:24 executing program 3: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='net/ip_tables_targets\x00') 17:49:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x1f, 0x0, "01834e06ea72e702345eae17418f04f7de21d2a4656ee316d1b9b4f1c510"}}}, {{@ipv6={@private1, @mcast1, [], [], 'bond_slave_1\x00', 'team_slave_1\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@mh={{0x28, 'mh\x00'}, {'%\n'}}]}, @common=@inet=@SYNPROXY={0x28, 'SYNPROXY\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) 17:49:24 executing program 5: sysfs$2(0x2, 0x0, &(0x7f0000000000)=""/101) 17:49:24 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000100)={@multicast, @random="24fa7b3a029f", @val={@void}, {@ipv6={0x86dd, @udp={0x0, 0x6, "b932ff", 0x18, 0x11, 0x0, @private1, @dev={0xfe, 0x80, [], 0x33}, {[], {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}}, 0x0) 17:49:24 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs\x00') 17:49:24 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000b80)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50952, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x460, 0x0, 0x0, 0x0, 0x2}, r1, 0x0, 0xffffffffffffffff, 0x0) [ 164.024058][T10270] x_tables: duplicate underflow at hook 3 17:49:24 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @tipc, @isdn, @l2}) 17:49:24 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000300)) timer_getoverrun(0x0) 17:49:24 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2={0x1f, 0x0, @none}, @l2={0x1f, 0x0, @none}, @rc={0x1f, @fixed}}) 17:49:24 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}], 0x1, 0x8050) 17:49:24 executing program 2: timer_create(0x2040cfb4bf41e412, 0x0, &(0x7f0000000280)) 17:49:24 executing program 1: syz_open_procfs(0x0, &(0x7f0000000800)='net/dev_mcast\x00') 17:49:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 17:49:25 executing program 5: timer_create(0x0, 0x0, &(0x7f00000001c0)) timer_gettime(0x0, 0x0) 17:49:25 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x9, 0x3, 0x338, 0xb8, 0xffffffff, 0xffffffff, 0xb8, 0xffffffff, 0x2a0, 0xffffffff, 0xffffffff, 0x2a0, 0xffffffff, 0x3, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'macvlan0\x00', 'veth1_vlan\x00', {}, {}, 0x29}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@ip={@empty, @private, 0x0, 0x0, 'vlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xc0, 0x1e8, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:initrc_exec_t:s0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 17:49:25 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@abs={0x1}, 0x6e) getsockname$unix(r0, 0x0, &(0x7f0000000080)) 17:49:25 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000b80)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getpriority(0x0, r1) 17:49:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005ec0)=[{{&(0x7f00000001c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=[@dstopts={{0x18}}], 0x18}}, {{&(0x7f0000000340)={0xa, 0x4e22, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000680)=[@hoplimit={{0x14, 0x29, 0x34, 0x9d5}}], 0x18}}], 0x2, 0x0) 17:49:25 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') 17:49:25 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x19, 0x0, &(0x7f0000000080)) [ 164.573051][T10301] x_tables: duplicate underflow at hook 3 17:49:25 executing program 2: syz_emit_ethernet(0xb1, &(0x7f0000000080)={@multicast, @random="24fa7a3a029f", @val={@void}, {@ipv6={0x86dd, @generic={0x0, 0x6, "142290", 0x77, 0x0, 0x0, @dev, @private1, {[@routing={0x0, 0x0, 0x0, 0x80}], "45f9f73918dd08b936f1d15c3042125ab58ddc7ca516dc6463777516f3e4ede9b423fbbf591b4dd3f0f326e458803426f592b8d1a1e184fd86419bbf9939b6dd11857b8dc537107e2d87906eed042fcf0df3c5b1d74ff5b3984282bed171b438a7071f9ce4b6abcbd77c689cab8436"}}}}}, &(0x7f0000000000)={0x0, 0x1, [0x2b0, 0xf54, 0x8d1, 0x175]}) 17:49:25 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) 17:49:25 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10246, 0x0) 17:49:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x37, 0x0, &(0x7f0000001000)) 17:49:25 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000000)=""/197) 17:49:25 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 17:49:25 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 17:49:25 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, &(0x7f0000001600)=[{0x0}, {&(0x7f0000000280)="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", 0xec1}], 0x2}}], 0x1, 0x0) 17:49:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x49, 0x0, &(0x7f0000000140)) 17:49:25 executing program 0: socket$inet6(0xa, 0x722ff4b217867692, 0x0) 17:49:25 executing program 3: signalfd4(0xffffffffffffffff, &(0x7f0000004b00), 0x8, 0x0) pipe(&(0x7f00000002c0)) pipe(&(0x7f00000002c0)) select(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380)={0xff}, &(0x7f0000000400)) 17:49:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x4) sendmmsg$inet6(r0, &(0x7f0000002f40)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@dstopts_2292={{0x18}}, @dontfrag={{0x14}}], 0x30}}], 0x1, 0x20000040) 17:49:25 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') 17:49:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x8, 0x0, 0x0) 17:49:25 executing program 0: mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x1832, 0xffffffffffffffff, 0x0) 17:49:25 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup2(r0, r0) getsockname$netlink(r1, 0x0, &(0x7f0000000040)=0xfffffffffffffe41) 17:49:25 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x5) 17:49:25 executing program 3: socket$inet(0x2, 0xc, 0x0) 17:49:26 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 17:49:26 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, @l2tp, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, @xdp, 0x85}) 17:49:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_matches\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x210000000013, &(0x7f0000000040)=0x100000001, 0x4) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) sendfile(r2, r0, 0x0, 0x4000000000edbc) 17:49:26 executing program 4: fanotify_mark(0xffffffffffffffff, 0x6, 0x0, 0xffffffffffffffff, 0x0) 17:49:26 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x17}, 0x1c) 17:49:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = dup(r0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x2, 0x801}, 0x14}}, 0x0) 17:49:26 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000002c0)={@random="526006504917", @link_local, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "bc18e5", 0x10, 0x21, 0x0, @private2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "e90682", 0x0, "77d8fa"}}}}}}}, 0x0) 17:49:26 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x59) 17:49:26 executing program 0: timer_create(0x7, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000000900)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000440)={{0x0, 0x3938700}, {0x0, r0+10000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) 17:49:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@mcast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@private, 0x0, 0x3c}, 0x0, @in=@remote}}, 0xe8) 17:49:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000540)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="7f", 0xfe7f}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)='7', 0x1}], 0x1}}], 0x3, 0x8000) 17:49:26 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40, 0x0) stat(&(0x7f0000005980)='./file0\x00', &(0x7f0000006fc0)) 17:49:26 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000300)) timer_gettime(0x0, &(0x7f0000003580)) 17:49:26 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f00000000c0)={{0x1, 0x0, 0xee01, 0x0, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/136) 17:49:26 executing program 0: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0/file0\x00'}, 0x10) 17:49:26 executing program 1: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000540)={{0x2, 0xee00}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 17:49:26 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x1b, &(0x7f0000000000)="d34df4ca0ac4db15abfb403d74c1e21f091240b5", 0x14) 17:49:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}]}, 0x24}}, 0x0) 17:49:26 executing program 4: timer_create(0x7, 0x0, &(0x7f0000000900)) timer_settime(0x0, 0x0, &(0x7f0000000980)={{}, {0x0, 0x989680}}, &(0x7f00000009c0)) 17:49:26 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002bc0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getpriority(0x2, r1) 17:49:26 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') 17:49:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0xb, 0x0, &(0x7f0000000180)) 17:49:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000b80)=@delqdisc={0x1040, 0x25, 0x0, 0x0, 0x0, {}, [@qdisc_kind_options=@q_tbf={{0x8, 0x1, 'tbf\x00'}, {0x1014, 0x2, [@TCA_TBF_RTAB={0x404}, @TCA_TBF_RTAB={0x404}, @TCA_TBF_PTAB={0x404}, @TCA_TBF_PTAB={0x404}]}}]}, 0x1040}}, 0x0) 17:49:26 executing program 3: epoll_pwait(0xffffffffffffffff, &(0x7f0000000140)=[{}], 0x1, 0x0, &(0x7f0000000180)={[0xf4]}, 0x8) 17:49:26 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002f80)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="7f", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000640)='7', 0x1}], 0x1, 0x0, 0x23}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, &(0x7f0000000880)=[{&(0x7f0000000140)="e208d4cfc98ac0aaf8fd204afaa13d7191c3d1ba11153fc211b5e12f9fb665c72b81bb13e53729cb1f28987fde5a1566f0ccc7f8077bcb16e5ed638e29c1c7926c7ec3095d5848267cb03cea7e55018871223abf52ceabc3a8b922b3c4b43555edd5d989a99c8454debfb844dd2cfc0b095dfecb33ea875e3d08cc3f7dd010f3948bee4bce9b35c0282ababef8c528548efe4fd6c423d2ec2e73d2c46ca74c6313a63a7cfd18eb69e05116895300961fc57c1363ce2986f8ee558590b74d33d55cf0acfc066d8cd984ab757674440c56841163a1"}, {&(0x7f0000000240)="63c4e3e8f68f09f25e936062a732b6194ea8d2d5228e3b3de300690ae53f4eb0e9e442ebebf23e0a52b31ca211eed32b58f09cf7b1b575090408c4ab0022cb676625536716c3ee77f6fa45f7bef14d01cc2ec7cbb62284ba86b7b578152105ed5c4dd362a7dbac4a68d4bf35f75677a8eacbb6df2b763fbb3b923fb8728a0f5405ff9b23fb1ef0d76aa6ca964ab64676869e42c68771bbe20b0e57775cb8"}, {&(0x7f0000000300)="6ac440a34ae1e62afccececf5573caace476bced599fb40b425d1b00c250216d710939bdfb2db9ecde55dcd8fbc46dc218bd3c2e381fe5fe711feb9e420272dcf101f39ff428abd504583aaac91a987c03bbb551ce323721d7a6e835b192863be94c00e1aa77b93e736d9015469a1be7ceacc6353518320206cc8961ed04f779d6389a9f31324e95f23628ef988d7dd34301ca619ec236b42d3461886c063b83840e4749ca29b130cc43260c8f59489484dd1a50ba9be4829ca0492f5ea6bc07c2f8ffd9e77f5e3ee2672251ef4b5c4caf8b02b6"}, {&(0x7f0000000080)}, {&(0x7f0000000440)="e11d25f14c3d2a39994811d6149d43670e81fc4bba4d021fe51e9c5c61682e7884a760f609873c8071653ed7820d8cc96a5c94e1913bfd03431efd5f47d6f6c3c7d64a2089af9a4705"}, {&(0x7f00000004c0)="32208a066778580b779d1eaef4b812fcb52a0e18142fa6a787167b3b7000e26d"}, {&(0x7f0000000680)="4aa9943bc757519caa46d0ccf134b43203236d955079d584cffa3221df25ccadc6f2b7d0e752ae66a40af8a6d3cb473dc244553818864a5aa07133dc827b46a840488679d96ed7cbecc2ed9fc8511411069af7191e856b28c89182aed29793a5d93167f5f8dfc02ff985bc8dd77f354230e5c9a42ebc0c776cd3aa5aadfa78e3fe477ce678f465d9981b8e1524635fa7ed4c61a0a034408f9b76f4f5ba24b3b3e85bcff0514a3dda21ea4fbd1adb1c62ef68304c64b1e0a06a36a90c14525cae253676f461c2374f073694e9f85e3ac205de8c62"}, {&(0x7f0000000780)="0f60aa1fcb48c81b962cbb1d4ef20b556579727c256a5bc45f4278f188ad10773842a912a8e9675cf5a463cb751c2e255841c2e2bcc478832a4ba7615b589cc115dc4d90b1b21b308301d279e15ffd5e4c40bc53d2d5ea6829c8c6b407f154c4b89f6205255fbfaa9d199a4019a6db9f0897cea952c280ec6693df8b89ecb560d8be8cb6154b9d556c4bb16312b19b8826dd1960b4e6f36f3a8d0fe3fa7b33c90c30da2f334715f3a3d2452c63c0158bb93ea208c28caf00446c5f3581ddf1cb9e74384cc064ba5596d0dce4ee1d7377425afc15b62c6f52e81470c7d62cd4"}], 0x0, &(0x7f0000000900)=[@hoplimit, @flowinfo, @flowinfo]}}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000000980)="951db16885304ee11d13483740a1e457ced7beceed6b11165af1cbdf0d64784ae10f9a30368effc1845239079e2c6dc3743c43fa13971e61456e0a5295d47a4cc3c17fa46aa6caa600ba3fd1054d95a73b42ed9399"}, {&(0x7f0000000a00)="4bf0f98912f44bd81d9a6b0e97a651266b7304f6756e91411fc07f8f7373ac577402db8acec3b14841e8a0bc56da7997b016c79554360f281a52e03d510a1f8f58a74a00d05890b946b48c871f5820103b3fdab2a0352c45e0ca4d299a6e16288103ff8e52b5e8277d45ea0a6f2b2a717f8b3ed358418cf3d80eefb5bdb86061d7141278cb5c30c8f50374899c40d3dcabe74ec0142b197c66c0b5ed04c8d0def88bf7a48dd84652a02546a270a39066159e40697aed43743c0d1216421d4bddf64276a8de2dee45f76e0bff5e88e1050c14167f93f6c0473a3259d80b58784e7f9e2e566a8d949d10d9ee239b7ecdc86e59c16600bb0bf0402484"}, {&(0x7f0000000b00)="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"}, {&(0x7f0000001b00)="6ee1d780a23a8329e0b1506b657ed1a889007196cd9698f3c87f09a2fd7f667456316a013521287c472d6e371f50ec4eb2c844c9518901b905a1082790e6239182660ce3e7ff53e85a73b6393fde935d3f6ef35826b39e9a8dc978f7da7d5fa42527fd8716733ac91e66dd422848f6ebb252b7b5b8cdce2c1fe8025346853fe6065634a7a8a2ac9cc9c11b0a380fe548ed322136d9de0f2e551ca4cf95b832cdafc24c63d61055482462174d8d1b954f3e877ac218ee296ed40129405527d7b9038b44c4714c72529fc4086ea60c179a80f61bd10a979d45470a8c72f907ebe80ef5aca2b51075"}, {&(0x7f0000001c00)="a6bad364003e67a0bc8fb7e1149fe86f5bf16fdeefa0c5ae4a426d0c68674e6eab80f84104b28a50edce2305d6916ff3467d6c2fa45afe821f03b0d8db80be94dc415bd57bcaa8dcd826a2a267b6c2c1"}, {&(0x7f0000000500)="c516f0dfbf94222e4a640dc4eb3da78ced1683ae2e1a91ae75db0fbad44554188650c06449b14125682c722cd326447393ac79298e320f"}, {&(0x7f0000001c80)="4819953e642e1ef90838c3f5db73bc6073b6f61386aef8bcf993cfdc7f5b782bd872c0d2915826f086f09c8ef8c6bd5d1d627714a851f40d10e5bafcd7aa68d4166c90d7821cf6b814860475be492b6d53ef70dc1b54b1635522ae306933b5a9f0c573ac6cdc3a85572bac4c245111557a8f469e5ee6ad727c078becdb9686e3658d76bef371be5e5010b66efd8a10380f4ba960c96db5068b35f2db8549c55b4cd52dea9ab06ec32c27a0039c0113882ed83a4a57a7ae3d245452447a61f1e5cd6f"}], 0x0, &(0x7f0000000600)=[@flowinfo]}}, {{&(0x7f0000001e00)={0xa, 0x0, 0x0, @private1}, 0x0, &(0x7f0000002f40)=[{&(0x7f0000001e40)="bcc00b40abd2e92edac0d6df7fd7be5bf4f2357523c3d90802ab948f67311d440a7587cc5db51b6cabd17d8c476574766515be1da36cd1893e5fa0b3c47faf61854c28f91170eb8430f5e3f4b5ac6458eae7db6eef25b1993237e342124ae431f37d4ad3ffca13e16b673dba2d8b18578c3bf1c423a193976aac5655d90ce05173b2e17de47cc283738a4de226026040aa9734153316187b213f53eec2eb"}, {&(0x7f0000001f00)="c8a4c34c0e060e"}, {&(0x7f0000001f40)="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"}]}}], 0x3, 0x8000) 17:49:26 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000100)='ns/user\x00') setns(r0, 0x20000) 17:49:26 executing program 0: select(0x22, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0) 17:49:27 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_matches\x00') ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, 0x0) 17:49:27 executing program 1: timer_create(0x0, &(0x7f0000000040), 0x0) clock_getres(0x3, &(0x7f0000000100)) 17:49:27 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'lo\x00', {0x2, 0x0, @dev}}) 17:49:27 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x17, 0x0, &(0x7f0000000180)) 17:49:27 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000001c0)=@abs, 0x6e) 17:49:27 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000004d40)=0x3, 0x4) 17:49:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000068c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0, 0x0, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}, @flowinfo={{0x14}}], 0x30}}], 0x1, 0x0) 17:49:27 executing program 1: renameat2(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) 17:49:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x4) sendmmsg$inet6(r0, &(0x7f0000001b80)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}], 0x1, 0x840) 17:49:27 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x989680}}, &(0x7f0000000240)) 17:49:27 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000004b00), 0x8, 0x0) pipe(&(0x7f00000002c0)) dup(r0) pipe(&(0x7f00000002c0)) select(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380)={0xff}, 0x0) signalfd(r0, &(0x7f0000000000), 0x8) 17:49:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x20040005) 17:49:27 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='totmaps\x00') 17:49:27 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x453, 0x0, 0x0, 0x0, 'Y'}, 0x14}}, 0x0) 17:49:27 executing program 5: msgrcv(0x0, 0x0, 0x0, 0x0, 0x6000) 17:49:27 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000080)={@dev, @link_local, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "b4b953", 0x4c, 0x2f, 0x0, @private1, @private1, {[@fragment={0x3b}]}}}}}, 0x0) 17:49:27 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x595001, 0x0) 17:49:27 executing program 0: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000140)=[{}], 0x1, 0x0, 0x0, 0x0) 17:49:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a80)=@mangle={'mangle\x00', 0x1f, 0x6, 0x500, 0x288, 0x288, 0x190, 0x370, 0x288, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@rand_addr, @rand_addr, 0x0, 0x0, 'ipvlan0\x00', 'dummy0\x00'}, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 'syzkaller0\x00', 'ipvlan0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x560) 17:49:27 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/raw\x00') 17:49:27 executing program 3: openat$tun(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 17:49:27 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000100)={0xa, 0x4e22, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=[@hoplimit_2292={{0x14}}], 0x18}, 0x10) [ 167.046074][T10454] x_tables: duplicate underflow at hook 1 17:49:28 executing program 2: mq_notify(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x2, @thr={0x0, 0x0}}) 17:49:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)=@RTM_NEWMDB={0x18, 0x54, 0x1}, 0x18}}, 0x0) 17:49:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64a70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:28 executing program 1: shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x6000) mincore(&(0x7f0000ffe000/0x2000)=nil, 0x2000, &(0x7f0000000140)=""/244) 17:49:28 executing program 3: msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000000)=""/4096) 17:49:28 executing program 4: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="a9", 0x1, 0xfffffffffffffffe) 17:49:28 executing program 1: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000ffe000/0x1000)=nil) 17:49:28 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x40902) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000140)) 17:49:28 executing program 5: syz_open_dev$char_raw(&(0x7f0000000580)='/dev/raw/raw#\x00', 0x1, 0x0) 17:49:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:49:28 executing program 3: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/136) 17:49:28 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/unix\x00') 17:49:28 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000100), 0x10) 17:49:28 executing program 3: epoll_pwait(0xffffffffffffffff, &(0x7f0000000140)=[{}], 0x1, 0x0, 0x0, 0x0) 17:49:28 executing program 2: syz_genetlink_get_family_id$devlink(0xfffffffffffffffe, 0xffffffffffffffff) 17:49:28 executing program 1: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) 17:49:28 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000013c0)='net/nfsfs\x00') mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 17:49:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, @l2tp, @in, @xdp, 0x5}) 17:49:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1, 0x24}, 0x1c) 17:49:29 executing program 3: add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000580)='logon\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000600)='\x00', 0x0) 17:49:29 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x4) sendmmsg$inet6(r0, &(0x7f0000001c80)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x0, 0x0, @loopback, 0x911}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=[@hoplimit_2292={{0x14}}, @rthdr={{0x18}}], 0x30}}], 0x2, 0x0) 17:49:29 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000040)) 17:49:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000540)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="7f", 0x1}], 0x1, 0x0, 0xfffffffffffffeeb}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)='7', 0x1}], 0x1}}], 0x3, 0x0) 17:49:29 executing program 4: setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@private0}, 0x0, @in=@broadcast}}, 0xfffffffffffffe8f) 17:49:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000004c0)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x108) 17:49:29 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4}, 0x1c) 17:49:29 executing program 1: timer_settime(0x0, 0x0, &(0x7f00000002c0), 0x0) 17:49:29 executing program 0: socket(0x1, 0x0, 0x1f) 17:49:29 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000e00)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}], 0x1, 0x488d4) 17:49:29 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=@hat={'permhat ', 0x4}, 0x1b) 17:49:29 executing program 1: io_setup(0x3d4, &(0x7f00000000c0)) io_setup(0x3e19, &(0x7f0000000000)) 17:49:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_buf(r0, 0x29, 0x8, &(0x7f0000000980)="a5afd17c", 0x4) 17:49:29 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0xffff, 0x0, 0x1, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}, @info_reply}}}}, 0x0) [ 168.881894][ T38] audit: type=1400 audit(1615744169.532:3): apparmor="DENIED" operation="change_hat" info="unconfined can not change_hat" error=-1 profile="unconfined" pid=10534 comm="syz-executor.4" 17:49:29 executing program 0: mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x103) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0xc, 0x0, "70a30a0e"}, &(0x7f0000000000), 0x0) 17:49:29 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) 17:49:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:49:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000007580)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001980)=[{0x10, 0x1, 0x1}], 0x10}}], 0x2, 0x0) 17:49:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPSET_CMD_LIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x7, 0x6, 0x5}, 0x14}}, 0x0) 17:49:29 executing program 1: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@multicast, @dev, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @broadcast, @broadcast}, {0x4e23, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "0c5e25518488c457d3494e241aa36e272980c5711f363840", "f36348df7a03ea8fe044b514cb50b53ecdb6a54c98f744e401edad9c0c5ad8f3"}}}}}}, 0x0) 17:49:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x7, 0xffffffffffffffff, 0x5) 17:49:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006d700)) 17:49:29 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0xe6f}, 0x1c) 17:49:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000240)) 17:49:29 executing program 1: getrusage(0x1, &(0x7f0000000200)) 17:49:29 executing program 3: syz_open_procfs(0x0, &(0x7f00000001c0)='net/anycast6\x00') 17:49:30 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000480)={@link_local, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}, @source_quench={0x4, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private}}}}}}, 0x0) 17:49:30 executing program 5: request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffb) 17:49:30 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/stat\x00', 0x0, 0x0) 17:49:30 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)) 17:49:30 executing program 4: r0 = getpgid(0x0) rt_tgsigqueueinfo(0x0, r0, 0x0, &(0x7f0000000000)) 17:49:30 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=@profile={'permprofile ', '/proc/thread-self/attr/current\x00'}, 0x2b) 17:49:30 executing program 2: socketpair(0x11, 0xa, 0x1ff, 0x0) 17:49:30 executing program 5: clock_getres(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000880)) 17:49:30 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000)='fscrypt-provisioning\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) 17:49:30 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000b40)='/proc/self/net/pfkey\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002bc0)={0x2020}, 0x2020) 17:49:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001f40)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x23, 0x0, 0x0) [ 169.722577][ T38] audit: type=1400 audit(1615744170.372:4): apparmor="DENIED" operation="change_profile" info="label not found" error=-2 profile="unconfined" name="/proc/thread-self/attr/current" pid=10583 comm="syz-executor.3" 17:49:30 executing program 3: msgget(0x2, 0x70c) 17:49:30 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000900)) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x3938700}, {r0, r1+10000000}}, 0x0) timer_gettime(0x0, &(0x7f00000003c0)) 17:49:30 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0x18, 0x2, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_TUPLE_ORIG={0x4}]}, 0x18}}, 0x0) 17:49:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@ipv4}, 0xa, @in6=@ipv4={[], [], @broadcast}}}, 0xe8) 17:49:30 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001380)={0x1c, 0x5, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 17:49:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 17:49:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000004300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 17:49:30 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote}, @can, @l2tp={0x2, 0x0, @multicast1}}) 17:49:30 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x43, 0x0, &(0x7f0000000180)=0xfe89) 17:49:30 executing program 2: keyctl$instantiate(0xc, 0x0, &(0x7f0000000000)=@encrypted_load={'load ', 'default', 0x20, 'user:', '-[^'}, 0x2c, 0x0) 17:49:30 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f00000000c0)) 17:49:30 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 17:49:30 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:30 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000001600)=ANY=[@ANYRES16, @ANYRESDEC, @ANYRESOCT], 0x4ea00) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) 17:49:30 executing program 3: perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22a10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:49:31 executing program 2: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) 17:49:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'pids'}]}, 0xe) 17:49:31 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x100002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) write$cgroup_subtree(r2, &(0x7f0000001600)=ANY=[@ANYRES16=r1, @ANYRES16, @ANYRESDEC, @ANYRESDEC], 0x4ea00) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000027c0)='cpuacct.usage_all\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc028660f, &(0x7f00000005c0)=0x443000033) 17:49:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000005640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 17:49:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:31 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xf, 0xffffffffffffffff, 0x0) 17:49:31 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'pids'}]}, 0xe) 17:49:31 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000003cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 17:49:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'io'}, {0x0, 'memory'}, {0x0, 'pids'}]}, 0x12) 17:49:31 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005700)) 17:49:31 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/uts\x00') 17:49:31 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:31 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:31 executing program 4: perf_event_open(&(0x7f0000003a40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:49:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'io'}, {0x0, 'memory'}, {0x0, 'pids'}]}, 0x12) 17:49:31 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:31 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup/syz0\x00', 0x200002, 0x0) 17:49:32 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:32 executing program 4: socketpair(0x1e, 0x0, 0x7, &(0x7f00000007c0)) 17:49:32 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x22001, 0x0) 17:49:32 executing program 3: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0xbb) 17:49:32 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9051, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:49:32 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="cb", 0x1}], 0x1, &(0x7f0000001180)=[{0x10, 0x15, 0x3}, {0x58, 0xfdfbfa9adbc71da0, 0x3, "9f5f6d6ae857a3eabf4e3293fb9815f153ea1a3222f71cbf27635ab7f9f98c4d46ad4316737875c0cd60ec50d1c8001f7048707c3ca5d0719d7ab3e170ac72959702ce067f15"}, {0x48, 0x10f, 0x0, "ecbf5da1e630b33f61d62961572a95d1502437092dc8a9b54da97458c724bcc7af56b6394d81227f28ab799e586eb4c03b2cc8"}, {0x10}], 0xc0}, 0x0) 17:49:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:32 executing program 3: perf_event_open(&(0x7f0000003a40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12550, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:49:32 executing program 2: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000056c0)=0xffffffffffffffff, 0x4) 17:49:32 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x11830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/uts\x00') 17:49:32 executing program 1: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000d640)={0x3}, 0x8) 17:49:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0\x00'}, 0x10) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) 17:49:32 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x18, 0x2, &(0x7f00000036c0)=@raw=[@btf_id], &(0x7f0000003700)='syzkaller\x00', 0x9108, 0x66, &(0x7f0000003740)=""/102, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:32 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x7, 0xa8, &(0x7f0000000380)=""/168, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000480), 0x10}, 0x78) 17:49:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:32 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x48040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:32 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 17:49:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="850000002200000085100000040040"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x94, &(0x7f0000000140)=""/148, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:32 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000300)=@framed={{}, [@jmp]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xa8, &(0x7f0000000380)=""/168, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x0, 0xb, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:33 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) 17:49:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'pids'}]}, 0xe) 17:49:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000240)='devices.allow\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3c, &(0x7f0000000000), 0x4) 17:49:33 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x4) sendmmsg$inet6(r0, &(0x7f0000001c80)=[{{&(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, 0x1c, &(0x7f0000001ac0)=[{&(0x7f00000005c0)="b0478e6ecabf5e3f82b92e41964a448845064539c80e913b6878706e956ae50006b1f8d1a4a7e10baf7e6eb647311857f083026fcbd6cd9723a0b10fba846239fa9d4ed6d4e636c981d059530db1e55207669f9b6ff36ef0579cbbb5f4f96f17c81da71e3c0cf3a0e4020ff49a34922329a0500c3a7997ead6b5af8fa7fae710e6ddb18eb45f3119bc6f8f57253297954f30a77d94c80e9e1e616aaf8a6a5eb167187e71e3d21c4e1cffb3a0af3239492fec64c5a0ce1616f9c2bb4aa027ee687de1138a5a0f7d72d9cc7609d4d04551fb6bd34f056b7a57282aea3ff6d684", 0xdf}, {&(0x7f00000006c0)="55023a5be9026859bfb7c15e8aab34672d7cfb8c72c1ab9de0fa1c00fa1c40acebf7abdc362e46c3df4df2e04a18cffba483e03d5857799dd96adf60e5f2203daa82281c5efb3217e57bd76d1ae592ad9e75240218e0a1a763ebe44f324b2a2e89f8a531a9602aff64d934e3c9123be0bb964a8e165078f2", 0x78}, {&(0x7f0000000000)="9bb6eedd7eb339633abf712051518712c62ea5939b52ae9a7174f4a6a18d75110a2b3e3919c8938006565463a9856950a3743e75fec8a4530c6654ef55fc53f37196d5c3cde6076aebee3c6663b8e1abef566aed692dc1cef721aa4681a0e6c399ab07a4afe58fd2", 0x68}, {&(0x7f00000007c0)="db8534491eefef4019129af7f78fc041c573bb74fb7da9b05a16b9cf8a7adeb91fc845b5b44dffa6dd73db924f883d34c7f346e01c08dea11aed7b0e9fa4737ab432e818e06e9dda5e02d3b1ddf40076558b86cf25f6eb68a8258b24ee65fbe0f6aea82453c6637acb6409881b74e23b0a58058170e7df79b74f1c59d9ea130316582b8a9024a40e7080b7bdb46d7dc593b5db88b7e1c37a59c94f8556a9ce9909a6336fb2ac24fcf422b77b47f47628ea90c0e7f2f7c635578b6df7567b7d23731557d4a72a611cc23c8993694e9d79f415b840edb2dc6fdbc3d49c8b8ad5e72548a80a04d9c49d3c636955fbd8db45d82119acdb1a", 0xf6}, {&(0x7f00000008c0)="95876acec19806ad56753a1a56bdd5a7f4bb1f086af64aac8b15db4405ffd51ecaa14f5729a87cb154cbe1a69213f9e102944d989919fc1b8978d01f13fe67be5be4be646bd659347a93f61255510d8e7eb31cdcb5ba6d3c707d8840cfd61abc718c2dc15a67da42cb955ba06b47e7d47b74918f69bd240ae1ee9ffbd8a900f2216744e305774a", 0x87}, {&(0x7f0000000980)="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", 0x815}], 0x6}}, {{&(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}], 0x2, 0x0) 17:49:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:33 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'pids'}]}, 0xe) 17:49:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:33 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'pids'}]}, 0xe) 17:49:34 executing program 0: mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000740)='syz1\x00', 0x1ff) 17:49:34 executing program 3: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:49:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:34 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000003980)={&(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="11", 0x1}], 0x1}, 0x0) 17:49:34 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'pids'}]}, 0xe) 17:49:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:34 executing program 0: bpf$BPF_PROG_ATTACH(0xb, 0x0, 0x0) 17:49:34 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000740), 0x0}, 0x48) 17:49:34 executing program 5: socketpair(0x7596e2dbc5f6bb48, 0x0, 0x0, 0x0) 17:49:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:34 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) 17:49:34 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:35 executing program 2: bpf$ITER_CREATE(0x21, &(0x7f0000001e00), 0x8) 17:49:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:35 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:35 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) 17:49:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:35 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:35 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003900)='cpuacct.usage_percpu\x00', 0x0, 0x0) 17:49:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2a) 17:49:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:35 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x0, 0x2, &(0x7f00000036c0)=@raw=[@btf_id={0x18, 0x2}], &(0x7f0000003700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:35 executing program 0: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000180)) 17:49:35 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:36 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 17:49:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000080)=ANY=[@ANYBLOB="85"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x94, &(0x7f0000000140)=""/148, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:36 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2a) 17:49:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:36 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) 17:49:36 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) 17:49:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:36 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="cb", 0x1}], 0x1, &(0x7f0000001180)=[{0x10}], 0x10}, 0x0) 17:49:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x18, 0x2, &(0x7f00000036c0)=@raw=[@btf_id], &(0x7f0000003700)='syzkaller\x00', 0x9108, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xfff8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:36 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/uts\x00') 17:49:36 executing program 5: bpf$BPF_PROG_ATTACH(0x16, 0x0, 0x0) 17:49:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:36 executing program 2: perf_event_open(&(0x7f0000003a40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12550, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) 17:49:36 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:36 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:36 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x0, 0x2, &(0x7f00000036c0)=@raw=[@btf_id], &(0x7f0000003700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:37 executing program 5: ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) socket$kcm(0x29, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x18, 0x2, &(0x7f00000036c0)=@raw=[@btf_id], &(0x7f0000003700)='syzkaller\x00', 0x9108, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:37 executing program 2: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)="cb", 0x1}], 0x1, &(0x7f0000001180)=[{0x28, 0x0, 0x0, "f4c5334d0732926b53f0c2abaceaca3501"}], 0x28}, 0x0) 17:49:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:37 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x28) 17:49:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x18, 0x2, &(0x7f00000036c0)=@raw=[@btf_id], &(0x7f0000003700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:37 executing program 5: perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:37 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11830, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:49:37 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x28) 17:49:37 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:37 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:37 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000300)=@framed={{}, [@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000340)='GPL\x00', 0x7, 0xa8, &(0x7f0000000380)=""/168, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:38 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x28) 17:49:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x20) 17:49:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:38 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x20) 17:49:38 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:38 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x7, 0xa8, &(0x7f0000000380)=""/168, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:38 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000940)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000740)="c4", &(0x7f0000000840)="14"}, 0x48) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:38 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:38 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000004c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000340)='GPL\x00', 0x7, 0xa8, &(0x7f0000000380)=""/168, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000440), 0x8, 0x10, 0x0}, 0x78) 17:49:38 executing program 0: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f000000d640), 0x8) 17:49:39 executing program 2: socketpair(0x1e, 0x5, 0x0, &(0x7f00000003c0)) 17:49:39 executing program 0: bpf$BPF_PROG_ATTACH(0x1b, 0x0, 0x0) 17:49:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:39 executing program 5: socketpair(0x1e, 0x0, 0x0, &(0x7f00000007c0)) 17:49:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:39 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x80280, 0x0) 17:49:39 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}]}, 0x8) 17:49:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:39 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 17:49:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:39 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[{0x10}], 0x10}, 0x0) 17:49:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:39 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:39 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x20) 17:49:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'memory'}, {0x0, 'pids'}]}, 0x1a) 17:49:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x20) 17:49:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'memory'}, {0x0, 'pids'}]}, 0x1a) 17:49:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, &(0x7f0000000940)={0x0, 0x6, 0x4, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:40 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'memory'}, {0x0, 'pids'}]}, 0x1a) 17:49:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x20) 17:49:40 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:40 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:41 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'memory'}, {0x0, 'pids'}]}, 0x1a) 17:49:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x20) 17:49:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:41 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x0, 'rdma'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x20) 17:49:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:41 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'memory'}, {0x0, 'io'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x20) 17:49:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:41 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:41 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:41 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:41 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000005680)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 17:49:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530707ae89de108a91d2d149ac7094e71b0fb1f147a8378f364602812c66538d740f6fe1d001f43f0500bb9fb045f2d1eaa302ab6cdfee0cc1a355b6aeb18d6d35250701000000bcb6739875acfa16bfb6a4f701cb31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939951f8ac3900000000000000000000000e66bbd9290a562a0f219b97c2a993d63d9129b1691ecad3f9b845dd12621fd30fdea3b8722e85e4ba9a30e7da2c627359ced32cc3a8fd87f7d0db6831cdaf17f17184d17d8869b8ed53ab1d23df62aaa6380549a9b14477db1be7c3a282fbd5844c63509061bc2e4368cb0e6b632fc08b8fe23b7f08e0339b7f54e9ef3b76f65e12b4e3a9b982028efa78dba42d000000b7fc7299d1e282721a03dec7fd69bc91f494e9", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:42 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x22843) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 17:49:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:42 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, 0x0) 17:49:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:42 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:42 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:45 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:45 executing program 5: getrusage(0xffffffffffffffff, &(0x7f0000002480)) 17:49:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:45 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f000000f1c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000100)) 17:49:45 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:45 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:45 executing program 5: socketpair(0x15, 0x0, 0x0, &(0x7f0000003680)) 17:49:45 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:45 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:48 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:48 executing program 5: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002500)={&(0x7f00000024c0)='./file0\x00'}, 0x10) 17:49:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:48 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c, &(0x7f00000014c0)=[{0x0}, {&(0x7f00000001c0)="21951b96ed9d07216988b9e71f7bcdfd3290c0e0586e5b440896031cdc8147b7bf00373c72bb58fe6ca1df1344", 0x2d}, {&(0x7f0000000200)="3f08a48017178d08d975", 0xa}, {&(0x7f0000000240)="ac4274cafd45f4390045875c733ada163cdb575c1ca210f162136a8e72983636ae2c232bda33735b97ab3bc62c525aa9a5b25207078848d31afb40eb0abc330176f2e0ba1c79377c5fe07b1e6748a315231de14d47ed2a885a33fa603c9f30fc285c5c00c5358661361be6248f58dce709662e53d3426bf5b6ae0f1364071c1027344d55b60cdeeebfcff5b8adca79e9e746bcae177bbe7a8e2e0b865f89004c64f7c9e3f3616262ff98ddeb5303d49d63ba7c715432fb58f07fa2239030417bd9c7cc718152466e712deaaf156bcf1b3e", 0xd1}, {&(0x7f0000000340)="e7bf4e895cc6ec6ddec8386ac4772b636dec5edc76a3064c5cff6647c3008988bead7b8593635af13bd36536f16995441fcb60f5a6d59d197c5a0ceec1adf4613a600c6f520d8d8001398c0f1453a622f4d33b5414f352cc9bda93a0a39d88cb6a09d1b9", 0x64}, {&(0x7f00000003c0)="ea904ee31dbf93e9559c66a438f840", 0xf}, {&(0x7f0000000400)="68858608b9be168bfe1695c2b3bc8b689e35b7f92034dfdd9865feae84e573aec864ed5325", 0x25}, {&(0x7f0000000440)="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", 0x40d}], 0x8}, 0x0) 17:49:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:48 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:51 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='p', 0x1, 0xffffffffffffffff) r1 = add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000001c0)={0x0, "7b8be7b6a8b4aeea0564a0105735f0ab533092b95bb21f653043d09f9fa1bc20d97a97f100a882f0a2dd292f121cc87f15d58ff3088a8f785de271d3d7da809c"}, 0x48, 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) 17:49:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:49:51 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:51 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:51 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:51 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:51 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet6(r0, &(0x7f0000000a80)={&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}, 0x0) 17:49:51 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:51 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:54 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x0, 0x0}) 17:49:54 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:54 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) 17:49:54 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:54 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:54 executing program 5: ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) 17:49:54 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='p', 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 17:49:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) [ 194.105289][ T3240] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.112289][ T3240] ieee802154 phy1 wpan1: encryption failed: -22 17:49:54 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:54 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894a, &(0x7f00000000c0)={'vxcan1\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 17:49:54 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:54 executing program 0: r0 = getpid() syz_open_procfs$userns(r0, &(0x7f0000000c40)='ns/user\x00') r1 = getpid() syz_open_procfs$userns(r1, &(0x7f0000000c40)='ns/user\x00') 17:49:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:55 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:55 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:55 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz0\x00', 0x200002, 0x0) 17:49:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:55 executing program 0: getresuid(&(0x7f0000000640), &(0x7f0000000680), &(0x7f00000006c0)) 17:49:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:55 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:55 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x8001, 0x0, "b0697fc6a99bc01e"}) 17:49:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:55 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:55 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:55 executing program 0: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x9, 0x200) 17:49:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:55 executing program 0: openat$ptp0(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptp0\x00', 0x8043, 0x0) 17:49:55 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:55 executing program 5: sendmsg$NL80211_CMD_PROBE_CLIENT(0xffffffffffffffff, 0x0, 0xa53f969292b05bf7) 17:49:55 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:55 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:55 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000500)={'wlan1\x00'}) 17:49:55 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netlink\x00') 17:49:56 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:56 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:56 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040)='fscrypt-provisioning\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)={0x0, 0x0, @a='\x01\x02\x03\x04\x05\x06\a\b\t\n\v\f\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&\'()*+,-./0123456789:;<=>?@'}, 0x48, 0xfffffffffffffff9) 17:49:56 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') read$FUSE(r0, &(0x7f0000000880)={0x2020}, 0x2020) 17:49:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:56 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:56 executing program 0: add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', 0x0, &(0x7f00000001c0)={0x0, "7b8be7b6a8b4aeea0564a0105735f0ab533092b95bb21f653043d09f9fa1bc20d97a97f100a882f0a2dd292f121cc87f15d58ff3088a8f785de271d3d7da809c"}, 0x48, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 17:49:56 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000d40)='ns/uts\x00') 17:49:56 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:56 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200400, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) 17:49:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:56 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:56 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 17:49:56 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003840)={0x18, 0x2, &(0x7f00000036c0)=@raw=[@btf_id], &(0x7f0000003700)='syzkaller\x00', 0x0, 0x66, &(0x7f0000003740)=""/102, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:49:56 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:56 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:56 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:56 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:57 executing program 3: syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:57 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:57 executing program 0: add_key$keyring(&(0x7f0000000580)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000001c0)={0x0, "7b8be7b6a8b4aeea0564a0105735f0ab533092b95bb21f653043d09f9fa1bc20d97a97f100a882f0a2dd292f121cc87f15d58ff3088a8f785de271d3d7da809c"}, 0x48, 0xfffffffffffffffd) 17:49:57 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:57 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:57 executing program 0: r0 = socket(0x2, 0x3, 0x3) getsockname$unix(r0, 0x0, &(0x7f0000000380)) 17:49:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x2e) 17:49:57 executing program 5: r0 = epoll_create(0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ppp\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)) 17:49:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:57 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'memory'}]}, 0x24) 17:49:57 executing program 0: shmctl$SHM_STAT(0x0, 0xd, &(0x7f00000001c0)=""/79) 17:49:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:57 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x82201, 0x0) 17:49:57 executing program 3: syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:57 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') 17:49:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:57 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:57 executing program 0: fork() wait4(0x0, 0x0, 0x1, &(0x7f0000002280)) 17:49:57 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:57 executing program 3: syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:58 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:58 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:58 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, "14163cf496da9d8d583a12fdf4985248a7f81a37d05265552be37ddfd25ae135515be107f85ffcd962d5453259ee7ec689a5cbe413c49ecd7aa0906d9f674dd6e75f16b0dca31739c3c9fc7d67337042"}, 0xd8) 17:49:58 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:58 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = socket(0x0, 0x0, 0xffff7fff) sendmsg$NL80211_CMD_UPDATE_FT_IES(r1, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MAC_ACL(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa8, 0x0, 0x400, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @device_b}, {0xa}, {0xa}, {0xa}]}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa, 0x6, @device_b}]}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0xa8}, 0x1, 0x0, 0x0, 0x1}, 0x40001) socket$packet(0x11, 0x2, 0x300) socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 17:49:58 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) 17:49:58 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) 17:49:58 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x1c) 17:49:58 executing program 5: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)={0x200}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x6]}, 0x8}) 17:49:58 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x26) 17:49:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:58 executing program 0: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x20100, 0x0) 17:49:58 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:58 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x16) 17:49:58 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x20) 17:49:58 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:58 executing program 5: memfd_create(&(0x7f0000000000)='(\x00', 0x3) 17:49:59 executing program 2: socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:59 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}]}, 0xe) 17:49:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:59 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000000200)="9000000018001f15b94d9b0dffff00210200be30080006050000030043000f00fe0000e4829041bea084d3a168d0bf46d32345653600648dcaaf6c26c2915bc549935ade4a460c892e1ae9d520a3227d509058ba86c9020800061412395403001600050005000000000000005e471f00e0ff57fd68be479a2352c08331b7ffb6ac62bb944cf2e708ab84670000000000", 0x90, 0x0, 0x0, 0x0) 17:49:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0x20, 0x0, 0x0, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}]}]}, 0x20}}, 0x0) 17:49:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x1a) 17:49:59 executing program 2: socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:59 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}]}, 0x8) 17:49:59 executing program 0: r0 = getpid() r1 = getpid() r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/key-users\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000040)) [ 198.481837][T11569] netlink: 'syz-executor.5': attribute type 15 has an invalid length. 17:49:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}]}, 0x12) [ 198.559654][T11569] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 198.600407][T11569] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:49:59 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}]}, 0x8) 17:49:59 executing program 2: socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}]}, 0xc) [ 198.691330][T11582] netlink: 'syz-executor.5': attribute type 15 has an invalid length. 17:49:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000002480), 0x8) [ 198.739703][T11582] netlink: 'syz-executor.5': attribute type 5 has an invalid length. [ 198.798138][T11582] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 17:49:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x35104f16e6722ec1}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}}, 0x0, @in=@multicast1}}, 0xe8) 17:49:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}]}, 0xc) 17:49:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c, &(0x7f00000014c0)=[{&(0x7f00000000c0)="784e8cc5bd57fde63825058756a1a26be040ecd9dbb9ae578dcfd474436b95f66ea297aa3b7e9a77c8936cddba3c9befb130ab346419aeded255f99617a673e5ad6fc63295c4b2fbb0f92a6247ac63485eddb8cc978379a45823df665471e06c6b4dc6b7593fd0d0cbc9f4a195a595888bfc86c887e9c77b3edbd3bc213757b5e21f5399899e03d673f7d256dfaa0536cbbefdd7f62be717f06470206cb3c740be9097fd139a9a3bcba632618b4020b991", 0xb1}, {&(0x7f00000001c0)="21951b96ed9d07216988b9e71f7bcdfd3290c0e0586e5b440896031cdc8147b7bf00373c72bb58fe6ca1df1344", 0x2d}, {&(0x7f0000000200)="3f08a48017178d08d975", 0xa}, {&(0x7f0000000240)="ac4274cafd45f4390045875c733ada163cdb575c1ca210f162136a8e72983636ae2c232bda33735b97ab3bc62c525aa9a5b25207078848d31afb40eb0abc330176f2e0ba1c79377c5fe07b1e6748a315231de14d47ed2a885a33fa603c9f30fc285c5c00c5358661361be6248f58dce709662e53d3426bf5b6ae0f1364071c1027344d55b60cdeeebfcff5b8adca79e9e746bcae177bbe7a8e2e0b865f89004c64f7c9e3f3616262ff98ddeb5303d49d63ba7c715432fb58f07fa2239030417bd9c7cc718152466e712deaaf156bcf1b3e", 0xd1}, {&(0x7f0000000340)="e7bf4e895cc6ec6ddec8386ac4772b636dec5edc76a3064c5cff6647c3008988bead7b8593635af13bd36536f16995441fcb60f5a6d59d197c5a0ceec1adf4613a600c6f520d8d8001398c0f1453a622f4d33b5414f352cc9bda93a0a39d88cb6a09d1b9", 0x64}, {&(0x7f00000003c0)="ea904ee31dbf93e9559c66a438f840", 0xf}, {&(0x7f0000000400)="68858608b9be168bfe1695c2b3bc8b689e35b7f92034dfdd9865feae84e573aec864ed5325", 0x25}, {&(0x7f0000000440)="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", 0x8f8}], 0x8}, 0x0) 17:49:59 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}]}, 0x8) 17:49:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000009a00)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 17:49:59 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:49:59 executing program 0: clock_nanosleep(0x0, 0x0, &(0x7f0000000080), 0x0) clock_getres(0x0, 0x0) 17:49:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}]}, 0xc) 17:49:59 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:49:59 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:49:59 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000000)=0x1000, 0x4) 17:50:00 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:00 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 17:50:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:00 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:00 executing program 5: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:50:00 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000580)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@rights={{0x10}}], 0x10}], 0x1, 0x1) 17:50:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @ethernet={0x0, @remote}, @xdp, @nl=@proc}) 17:50:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:00 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'rdma'}]}, 0x6) 17:50:00 executing program 0: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x3938700}, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 17:50:00 executing program 5: r0 = fork() ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) 17:50:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:00 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}]}, 0xe) 17:50:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:00 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_timeval(r0, 0x1, 0x15, 0x0, &(0x7f0000000040)) 17:50:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @dev}, 0x1c) 17:50:00 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:00 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:00 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:01 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40000, 0x0) 17:50:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='attr/prev\x00') read$FUSE(r0, 0x0, 0x0) 17:50:01 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:01 executing program 4: bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:01 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xffffffff}]}) openat$nvram(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:50:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:01 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:01 executing program 4: open$dir(&(0x7f0000000540)='./file0\x00', 0x40, 0x0) statx(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000600)) 17:50:01 executing program 5: capset(&(0x7f0000000080)={0x20071026}, &(0x7f00000001c0)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f00000001c0)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71002000000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 200.841450][ T38] audit: type=1326 audit(1615744201.493:5): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11695 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465f69 code=0xffff0000 17:50:01 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)={0x20, 0x1, 0x1, 0x301, 0x0, 0x0, {}, [@CTA_SYNPROXY={0x4}, @CTA_MARK={0x8}]}, 0x20}}, 0x0) 17:50:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:01 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'rdma'}]}, 0x6) 17:50:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) [ 200.970364][T11708] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure 17:50:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x40, 0xa, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_LINENO={0x8}}]}]}, 0x40}}, 0x0) 17:50:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:01 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:01 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000001b40)) 17:50:01 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000080)={@multicast1, @broadcast}, &(0x7f00000000c0)=0x8) 17:50:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:02 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:02 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:02 executing program 4: r0 = epoll_create1(0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/key-users\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000100)={0x90000000}) 17:50:02 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000080)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0}, 0x4040880) 17:50:02 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:04 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:04 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x20040, 0x0) 17:50:04 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:04 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:04 executing program 0: getrandom(&(0x7f0000001740)=""/4102, 0x1006, 0x0) 17:50:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:05 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:05 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) 17:50:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530707ae89de108a91d2d149ac7094e71b0fb1f147a8378f364602812c66538d740f6fe1d001f43f0500bb9fb045f2d1eaa302ab6cdfee0cc1a355b6aeb18d6d35250701000000bcb6739875acfa16bfb6a4f701cb31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:05 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000080)='rxrpc_s\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0) 17:50:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:07 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:07 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000002300)) 17:50:08 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000980)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x33}, 0x0, @in=@multicast1, 0x0, 0x1}}, 0xe8) 17:50:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000000), 0x4) 17:50:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:08 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:08 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 17:50:08 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x11a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) socket$kcm(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000540)=@nfc={0x103, 0x14}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa804, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x806}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:50:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530707ae89de108a91d2d149ac7094e71b0fb1f147a8378f364602812c66538d740f6fe1d001f43f0500bb9fb045f2d1eaa302ab6cdfee0cc1a355b6aeb18d6d35250701000000bcb6739875acfa16bfb6a4f701cb31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939951f8ac3900", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:11 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:11 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:14 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000001c0)={0x0, "7b8be7b6a8b4aeea0564a0105735f0ab533092b95bb21f653043d09f9fa1bc20d97a97f100a882f0a2dd292f121cc87f15d58ff3088a8f785de271d3d7da809c"}, 0x48, 0xfffffffffffffffd) keyctl$unlink(0x9, 0x0, r0) 17:50:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:14 executing program 0: add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000002c0)={0x0, "df62f5d8997b53904c9c8fee5ef0684307796daed293eb487aa82b8dcc5e919801cd131cbf2cc191e7ebadc38093a0de8c30626154c84f527d0e81d38dc91a27"}, 0x48, 0xfffffffffffffffc) add_key$user(&(0x7f0000000100)='user\x00', 0x0, 0x0, 0x0, r0) 17:50:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:14 executing program 5: clock_nanosleep(0x8989fad5f7a07fec, 0x0, &(0x7f00000000c0), 0x0) 17:50:14 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x12c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:14 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/sco\x00') 17:50:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@dev}, 0x14) 17:50:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:17 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000013c0)={0xf20, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_TESTDATA={0xea5, 0x45, "76e1ae7b108477218ef26f8c14668d7f28528cea1b35092cf5fbe7e4c3bb20cc979108736d975904c4bd259dbfea0d0e0f977821dc2b6b37574512d29cdf5e23153f33c2547aec23819a4dc507ef7945ce17891fb5cbdc2682ea3c2f3204a6452c6d431cc50e8ce56d2e57857934e1aa0030da8dc5f8543ab50bd21d28e2f6da755d5d699f71240595d49087a311a79651a532c7229ad2e81e2d6438ce88e8731e74ccdef899957e09f8b91cd7a4871b58e1130c61a59358ca8eabba0211e662fb63f29eb579fd17b2480c16c1408e0aee0fc092334ea4f1853914017686f9435e33e4b3cfe9b63bd693cdf34e28f230d4adae9b2509043bd0a4e00f80301252888e768986efebc4ee7cc007aecda388594345de410599ca45ae8b3372534ef3d3e3404edf312f9acf45b40fa86363daf498448f032616a2f581032db4b58d4f67c1ed461679c38cd6b65f611de8a42596db8d232ae48b41b28557115d96f2ba1c39e030d1d91858a1b52a8b3356fd8c6bff8f6eeb01d2affd2d2d3b20a96cdedd99c5908d8863c812ab20d666ceecc7d93d6f0a56062eb5f17d918d113669a01a519a599c88bc403f9054c443451397d92550728383b6ad7876a7a4608fdd29701b03eb58b3884efbcf4df11b6e9a25b86aaea4e0d5ffc938e97b8a4487fed1e6f6ca25afa5f45ee4585aa8fdf43331408a35cd7da8a41e18e7fe77e1bf763bf266e1b7c68f327cd4f1a83d6b16a890683ff768333049e25f9ecd6878a4c8cb7a2c5eb76fbae7a26b45029ebc85bf7f0da8256bfccac29d02b5fca6970b487fa56c1af67a8e622a0cf97f93562f48aa15f3d6e6c991a5839b30a4084cc7c11a0644569ea7a1051a3421116c78ea151b0ca824fc66db060e548999ed475323951e7373fd064405976d23caec252db87b7656baa1bcf8c0bb0e247ebdb6c4f202070d00c484422ab04f3f43987c8a7b37b8a4704f2579ae3e2b7cbf87c9ea8a3f051d4216800f6924dbd0fc21d84239dd5a4ba8c9e4aded3d5aceec76d411490f8316d34d1504da959ec9711e9bec1d4f7718bdedbf818e138c49902930e56751a60d692e661226ad16d204d51c69dbcf1d0673425c5ae8fc0a80abaa4e5278a4f35adeace13148fc2a6cb58fa906aeb7da3bbe910614ab6cdc80467825b5c81db2f15cf454b3059830cfa94bce8a3b1d2c54073f007fc933ceed08ffc36982d1398c7d5dd6b55593ff5b3853d6ef501a5e4b2398a4416b4bc9bf5583bfc6dde9fe4df7032d9675d55408984150aa2d172d630376231de7fb1870517fa1b37d203c649cd01b7f8596716d859ba55aea88de94312aa81084dc35a750a02f6f45977199d542293ed250f35508f2dec777f53f948b2d1753be6751080b1dcb442017771fdb36514775ffe97aa45245c1d9224cf3202a5443bacc1230578254058c38a1117259757cc2cea3e10ed46e447d4177f780ecb21cbf9f24be766465f9934beb21f1cbf6e4a9e3cb5872c619e878310ea1febf81e1fb80e5a5f6f916a7d895ada4606e37fb7390c43628446c59e709a8e7bfd99df8d11d802e478a0a45c52e830d0bcecf32fb9e25762a74166cf9eb1130f4b08d1f97b532cdc4b0f79fbaca47bc0393528be4d790cb5e11097f46ea9124b8f4cdef33788b50ae304c992ad38347597e058647f4f49704a8afea5e9313124b6661c00320c71576d2636675f0cd3533d9cbae2ab8fd4613c88a458a524095953b1d2f4d26d98c434f46015c9669b29191721dea2b8a1cf5314b83c0976d32c1982f1202842467375b1737c3e0304db7a46c7ef30a0b55c8d30dd03c44dc116198d324baee4a6368d8bef984825eba0d00fb1b419b6f21e04fa79fd7ed9794ead578e42203b1b7ce46d862f8fb47e2ef14c45c76994a56c492e534f74fad6a9120f0c50effd9555f592ad4ab8d16111625ecc3a6e8f0840463f4e614e334f6506828b72f061ed02179c68f11ec46efdcd6e2d51bc221e85c6eb7a6579505064e0aa8fef8c057d74484c6d29cf8dced180ca7d3886447359b7dba88b656288a8659feceba16e1fd97c81132bc981f916f211bb753037cff694dc1b381d43cf1cdd71a37faf47852cad38f682e899f3798c2d19305a12e72ce93fa73198af96d28b4ae5918039cdb9c97e4c9a3fcfb0a02dc17b4a974f1aa03ddb601bfa175617860b5f15b28b15cf6f8435268aedeb1538ad6a574ae445256469f35efc316eae72454ba8292a47a3eac94c7b64f0d73ca3c1deee40b7e560a1308b18544ee670c43577e2989c9a1d91997726c98611fc4079cb393b1e0e829ce9da716228496fdc842ab62caa666e9695d8731000526c2464cd29bfa5e90973a623ec01f8e44af5eb7dd56016817e173168f3b0539657485051b8ebcf7801cb0ddaedb44e09bc7b60579f109928fc0a6c280b73a643359558cf96ddf8d0c71ae340b1dcdc81441fd40b36c86d041b060ed7c7dc89040842062ff0f8bbfd764d352d553c0ad572b66b2050b91f2dda31b2d24479cd152eb2d3bf64d0d9ba0834b81435cb70f4670649c1ad4708a687c66432bf28dd6a83a430fdfaa596fc425813ecea4a84373ed71ba23cb4e3b87a29c48fccc5975a77b5a423fe50daf99ab8a2f555f2481ce0bf94f20730873b5b2214acc91b592a50c79c24b8835de9274e6ead4b649aac2b7982b56a1dd1549c0e8c8212975dd9297f9e48347d2ec87b690093474c994effb3b2a6ed64db22cd7709d5a3a07017d5973bb2e76a0572ca9c7a80ddfe970cb85654a131b681257da4685883bf256f6c1b379ab61e18d97f2b48cd763ec31b49b820dbbff8cb0ae85383d45f863bca5eb24d25c768d6e2daf6807441183cfdf4b2c1f5abf6663045b2aa5efce30aec664d33a3b6953c68d5b5da3e37b6f2758ace9fcf60c2f0a3368957e3edb7c497f678c1cf01d5070f3b63e1ac5ff2f7ea47f557b09d422ac3997b5e96c5744dfdc36bf04bfc5fac1091b9c106186c5c69e5c2ab35a4282e94b309053d3515a2e84ab22adf89464b3779268230a6d07170a06c16a1d733991d58bb838528294fafe4d8e3da005e5306b905f1eb7e5405fc5b7ebb36616eb4c2a334b58c083823c5e2c192a0e7a54a4bc40e021229f286f0ec0b0f2e4b740413046413915a6400934d32218dec5fc513b2678ed9babc08954bf035fdc75084877014f3bbed76912f3fae854a9b65d1d48e8e777fd6586a86c04a301285ddea550a1c5f843494be943645148ad17b7e77fb538d88033aecc757c694c2b44fce286341dde5a1edfa380ae39e36ad5993b7be19da19b0ba4908b7ca8408976ee912154a3bb978e906f02c5e2548a9594fa100cea8b3c2d059c0b42e9c41051b7d8642448c057fe5718b1cc98200167dd236d97b2d4af8b60a19fe8473d82691ecd30ddd694159744af524e15a11576e2feb756c986ddfac508e86f07b209ef406dd208d95cea105ae7db1ff92b9974c584f8b563a0b7e4045047587c399d17ee0a56de8bacb2d831ce7b8783fb7a1a96d3b6173015ef5e5103c1cdfe78babcdb461124ee9a17108853214da387a6ae6190ff080a84b0886b590e2f25572af6688af5b88541b105670301dfbfd178c8b50b4f1749d3d72cba166fa9ae656316290fc2c53ac014738aa58d28f614ad0dd293d53bc1f542464f933f02bcf4e3f78648c1b41ee399ffc84a7caf4e05b617e51c41895be8cc1b5d6fbb2fe43c14f1f898553ab1d9596ddbcc00de7c252e63184533c2c82c3cc626b0c49bc98e2d3172118c0215f0b02bd4e0082b05385bd3da11836ff79c944416e92fa7c91f7538221c966c3f36de22daa13ea774c77803b14a886e183ae2afd7f94305d3546d1b5d10b5890837f2121388fb6a0674ce02cb659dbe01951abaef3bd43df2a16fb4ac6b5e6e50829784594f504f0a9f7ea0ec47d67142a67f576f4d0a0d01099d91fb8cc34a61ca0832c4ca85275934d27f9a25cad5daa8e0d97575c4b2d1a488b90ae65290505f791835eee991c18d2a606765353ab3d66cd5fcde649187d38ab6554a9425767fccab59438e275765ab4114ce30a82b1c481fa8344e1fb0776395bc35bd06819e311704a1d30c779254ccd9774d8e13320d083950496a2aa8692a469f7951a0224a1b69a75efe7f3364c76cedf22aa3b1fb54bc5f5cb16b8faf4a65fb66272a8f2b25b419ae11fc54b40932332880f87c63e3bee5e4276b84192fdc166ed02f70393ac789c5db26d4bb4b3fcaa8675db8c353b3b37143a888deecd0fb437453162d5f694289eade071852b263c128f52d7d5d8d41bf5802148ebe0dbf4fb0cd2cb6da3e4a6c03389a7d6216f44227eb19af0d830c220261f74cc089f00355828c8012a8f0fd47ae4cbe1f8cc0fd82a540bdcb1bf6bce80a7b4906a6798923d4cae6f4281d2c07192e82ec4654539faa260738046772b37f825b13cc0a87b6eadc21b023aa130ef0294018a00c4c07d959cbeb2e744a8271dba87edb9b3c884f28a597adc6793f7fd8b53cbe1bda3a47e2699aaea8aa1af3622bea0f2da2110d3db1c39f380fabb722a69466a685c10ff6ab88946f48934e1146aca1876eda5951e93eb0bfc4614c9ae8317410d836fd6b365fea8c248e6a54062d5ccbccbd570de49833bcde777b035bb8fe536b3b10e75b434898e9530a533f3b6e48d0015ed34f57ffcbe8341f7a184008952e68eab0dc8dd382503f58a5b6db73cb7d4a5edd2bc3967f7628762ff9172626af05eb9c47704d7d2ef0e81d006b8aeb2f4d053dc5171a6c46c687881c354d7deaccc954225641322a2d11b6c07e79099fb469b259cc038a8fcce85101f63996df615fcbb69626e85de5b379e24afef39c9c66537101da17050c109c3b10e410d5f05ebbfda276115801120a8e0a87534050ba148ec2dd3dd0017f9ea43fb940d6cd2d565c5af7ee58bf221ab763c924ad0660410daf2a687cc025a2dd1f24ef15810d6659238ff929ef09b6c52ed0ee6179594787a006498aa4c2ce1b721b4ff6706f5362a1f88f6e4a062a4ec1b4647b95ca3b0c0f5df7aae6a8bf5d716e97c9c87dc2b70e3de3f354b839a9f45677665dd823eaa317985e771414f1f6a51c33db032131df7607c31fb1551cc913699a021b19fcb0b2d7680cf70070b3ce4b13247b839a5258dac449da164729f59d2db8f8802e61a1ad3662c88f19d672bb318bcd18bfdcd8258cf0c334128ae73cec62eedfdd5e8723300b3172986e0bfb7541dd241e8df89700108859a2e2896e34aabb45af26bfa2"}]}, 0xec4}}, 0x20000) 17:50:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) 17:50:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet6(r0, &(0x7f0000001580)={&(0x7f0000000080)={0xa, 0x4e20, 0x0, @remote}, 0x1c, &(0x7f00000014c0)=[{&(0x7f00000000c0)="784e8cc5bd57fde63825058756a1a26be040ecd9dbb9ae578dcfd474436b95f66ea297aa3b7e9a77c8936cddba3c9befb130ab346419aeded255f99617a673e5ad6fc63295c4b2fbb0f92a6247ac63485eddb8cc978379a45823df665471e06c6b4dc6b7593fd0d0cbc9f4a195a595888bfc86c887e9c77b3edbd3bc213757b5e21f5399899e03d673f7d256dfaa0536cbbefdd7f62be717f06470206cb3c740be9097fd139a9a3bcba632618b4020b991", 0xb1}, {0x0}, {&(0x7f00000001c0)="21951b96ed9d07216988b9e71f7bcdfd3290c0e0586e5b440896031cdc8147b7bf00373c72bb58fe6ca1df1344", 0x2d}, {&(0x7f0000000200)="3f08a48017178d08d975", 0xa}, {&(0x7f0000000240)="ac4274cafd45f4390045875c733ada163cdb575c1ca210f162136a8e72983636ae2c232bda33735b97ab3bc62c525aa9a5b25207078848d31afb40eb0abc330176f2e0ba1c79377c5fe07b1e6748a315231de14d47ed2a885a33fa603c9f30fc285c5c00c5358661361be6248f58dce709662e53d3426bf5b6ae0f1364071c1027344d55b60cdeeebfcff5b8adca79e9e746bcae177bbe7a8e2e0b865f89004c64f7c9e3f3616262ff98ddeb5303d49d63ba7c715432fb58f07fa2239030417bd9c7cc718152466e712deaaf156bcf1b3e", 0xd1}, {&(0x7f0000000340)="e7bf4e895cc6ec6ddec8386ac4772b636dec5edc76a3064c5cff6647c3008988bead7b8593635af13bd36536f16995441fcb60f5a6d59d197c5a0ceec1adf4613a600c6f520d8d8001398c0f1453a622f4d33b5414f352cc9bda93a0a39d88cb6a09d1b9", 0x64}, {&(0x7f00000003c0)="ea904ee31dbf93e9559c66a438f840", 0xf}, {&(0x7f0000000400)="68858608b9be168bfe1695c2b3bc8b689e35b7f92034dfdd9865feae84e573aec864ed5325", 0x25}, {&(0x7f0000000440)="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", 0x8f8}], 0x9}, 0x0) 17:50:17 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x4c5d}, 0x1c) 17:50:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)="e1a2", 0x2}], 0x1}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:17 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:17 executing program 5: syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') 17:50:17 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd\x00') read$FUSE(r0, 0x0, 0x0) 17:50:20 executing program 0: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='$\x00') 17:50:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x105}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:20 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x4c, 0x3, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_V6_MAXIP={0x14, 0x5, @empty}]}, @CTA_LABELS_MASK={0x18, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, 0x4c}}, 0x0) 17:50:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@private1, @private0, @private1, 0x0, 0x8}) 17:50:20 executing program 4: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/253) 17:50:20 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@routing, 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, 0x0, 0x0) 17:50:20 executing program 5: r0 = shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x5000) shmdt(r0) 17:50:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmsg(r0, &(0x7f0000000f00)={0x0, 0x0, 0x0}, 0x2060) 17:50:20 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:20 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) 17:50:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, 0x0, &(0x7f0000002300)) 17:50:23 executing program 0: r0 = fork() tkill(r0, 0x16) 17:50:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:23 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, 0x3, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 17:50:23 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x5000) 17:50:23 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x21, &(0x7f0000000040)=0xffffffff, 0x4) 17:50:23 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x0, {0x0, 0x0, 0x10001}}) 17:50:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:23 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) 17:50:23 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/key-users\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 17:50:23 executing program 4: syz_emit_ethernet(0x56, &(0x7f0000000040)={@empty, @link_local, @void, {@ipv4={0x800, @igmp={{0x10, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x2, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end, @ssrr={0x89, 0x27, 0x0, [@dev, @empty, @multicast2, @rand_addr, @private, @empty, @private, @empty, @rand_addr]}, @noop]}}, {0x0, 0x0, 0x0, @dev}}}}}, 0x0) 17:50:23 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}) 17:50:23 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r0, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x4008811, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @remote}, 0x1c) 17:50:23 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:23 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 17:50:23 executing program 4: wait4(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000100)) [ 223.274851][ T38] audit: type=1326 audit(1615744223.935:6): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12046 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465f69 code=0x0 17:50:24 executing program 1: socket$inet(0x2, 0x0, 0x65ca) 17:50:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:24 executing program 5: keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', 0x0, 0xfffffffffffffff8) 17:50:24 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 17:50:24 executing program 4: open$dir(&(0x7f0000000080)='./file0\x00', 0x19b0c2, 0x0) 17:50:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000025c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000002600)) 17:50:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:24 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='cgroup\x00') read$FUSE(r0, 0x0, 0x0) 17:50:24 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 17:50:24 executing program 4: r0 = socket(0x2, 0x3, 0x3) connect$unix(r0, 0x0, 0x0) 17:50:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:24 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='p', 0x1, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="1c", 0x1, r0) keyctl$set_timeout(0xf, r1, 0xb6) 17:50:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') read$FUSE(r0, &(0x7f00000000c0)={0x2020}, 0x2020) 17:50:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:24 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') read$FUSE(r0, &(0x7f0000000880)={0x2020}, 0x2020) 17:50:24 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_flowlabel\x00') 17:50:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, 0x0, 0x0, 0x4008811, &(0x7f0000000100)={0xa, 0x4e26, 0x0, @mcast2}, 0x1c) 17:50:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:24 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:24 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid_for_children\x00') 17:50:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) 17:50:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="66530707ae89de108a91d2d149ac7094e71b0fb1f147a8378f364602812c66538d740f6fe1d001f43f0500bb9fb045f2d1eaa302ab6cdfee0cc1a355b6aeb18d6d35250701000000bcb6739875acfa16bfb6a4f701cb31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939951f8ac39000000000000000000", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 17:50:24 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/timer_list\x00', 0x0, 0x0) 17:50:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:25 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='timers\x00') 17:50:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @empty}, 0x80) 17:50:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, 0x0, 0x0, 0x80000) socket$inet6_udplite(0xa, 0x2, 0x88) 17:50:25 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000840)='cgroup\x00') perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xc, 0xffffffffffffffff, 0x5) 17:50:25 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000080)={0x99}) 17:50:25 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:25 executing program 1: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/slabinfo\x00', 0x0, 0x0) 17:50:27 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = eventfd2(0xfffffffa, 0x0) ppoll(&(0x7f0000000100)=[{r1}, {r0}, {r0}], 0x3, &(0x7f00000001c0), 0x0, 0x0) 17:50:27 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ppp\x00', 0x40, 0x0) 17:50:27 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 17:50:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:27 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8f28, 0x35f}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 17:50:27 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) [ 227.330113][T12156] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 227.371446][T12156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 17:50:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000000)) 17:50:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000040)) 17:50:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) [ 227.476848][T12156] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:50:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = eventfd2(0xfffffffa, 0x0) ppoll(&(0x7f0000000100)=[{r1}, {r0}, {r0}], 0x3, &(0x7f00000001c0), 0x0, 0x0) [ 227.551612][T12156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 227.581455][T12156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:50:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f00000000c0)=""/254) [ 227.762544][T12178] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 17:50:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x0, 'memory'}]}, 0x2e) 17:50:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = eventfd2(0xfffffffa, 0x0) ppoll(&(0x7f0000000100)=[{r1}, {r0}, {r0}], 0x3, &(0x7f00000001c0), 0x0, 0x0) [ 227.824318][T12178] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 227.904495][T12178] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 227.990018][T12178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.032509][T12178] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:28 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYRES16, @ANYBLOB="000100000000"], 0x20}}, 0x40000c0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x164}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8f28, 0x35f}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 17:50:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000040)) 17:50:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) 17:50:28 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, 0x0) 17:50:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = eventfd2(0xfffffffa, 0x0) ppoll(&(0x7f0000000100)=[{r1}, {r0}, {r0}], 0x3, &(0x7f00000001c0), 0x0, 0x0) 17:50:29 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = dup(r2) bind$alg(r3, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1e8640, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x1, 0x0, 0x0) 17:50:29 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8f28, 0x35f}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 17:50:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) [ 228.312468][T12206] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 228.346930][T12206] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 17:50:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000001400)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000040)=""/62) 17:50:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, 0x0, 0x0) [ 228.439801][T12206] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.499110][T12206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.556858][T12206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.647088][T12214] netlink: 'syz-executor.4': attribute type 27 has an invalid length. [ 228.693089][T12214] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 228.737795][T12214] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.759531][T12214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.768152][T12214] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 228.795105][T12223] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 228.812161][T12223] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 228.866100][T12223] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 228.913676][T12223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 228.942262][T12223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:29 executing program 0: r0 = socket(0x2, 0x1, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 17:50:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4d5bfa4d6eef6b02, 0x0) open$dir(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 17:50:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x26) 17:50:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:29 executing program 4: mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) 17:50:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4d5bfa4d6eef6b02, 0x0) lchown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 17:50:29 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x20) 17:50:29 executing program 0: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8f28}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 17:50:29 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x38}}, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x0, 0x35f}, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) 17:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4d5bfa4d6eef6b02, 0x0) rmdir(&(0x7f0000000000)='.\x00') 17:50:29 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=0xfffffffffffffc01}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:30 executing program 4: r0 = socket(0x1, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 229.357918][T12249] netlink: 'syz-executor.0': attribute type 27 has an invalid length. [ 229.378057][T12249] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x20) 17:50:30 executing program 5: r0 = socket(0x2, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40d, &(0x7f00000000c0)={0x18, 0x2}, 0xc) 17:50:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) [ 229.500509][T12249] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4d5bfa4d6eef6b02, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') [ 229.560873][T12249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.598728][T12249] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x20) [ 229.800003][T12250] netlink: 'syz-executor.1': attribute type 27 has an invalid length. 17:50:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}]}, 0x1a) [ 229.842911][T12250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 229.920365][T12250] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 229.937968][T12250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 229.958453][T12250] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:30 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x2b, 'rdma'}]}, 0x12) 17:50:30 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) [ 230.049896][T12276] netlink: 'syz-executor.1': attribute type 27 has an invalid length. [ 230.089298][T12276] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 230.130670][T12276] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 230.209422][T12276] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 230.245481][T12276] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:31 executing program 1: r0 = socket(0x1e, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000040), 0x10) 17:50:31 executing program 5: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x6, 0x10, 0xffffffffffffffff, 0x0) 17:50:31 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000340)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) 17:50:31 executing program 4: pkey_mprotect(&(0x7f0000fee000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fed000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 17:50:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}]}, 0xc) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:31 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001f40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 17:50:31 executing program 5: r0 = socket(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x8, &(0x7f0000000000), 0x4) 17:50:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}]}, 0xc) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:31 executing program 4: r0 = socket(0x1e, 0x3, 0x0) connect(r0, &(0x7f0000000100)=@un=@file={0x0, './file0\x00'}, 0xa) 17:50:31 executing program 1: chown(&(0x7f0000000180)='.\x00', 0x0, 0xffffffffffffffff) 17:50:31 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000000), 0x10) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:31 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/key-users\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 17:50:31 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000180)=@bpf_ext={0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005700)) 17:50:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}]}, 0xc) 17:50:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000ac0)={'syztnl2\x00', 0x0}) 17:50:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000002ac0)=ANY=[], 0x130c}}, 0x0) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:31 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:31 executing program 4: r0 = socket(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000000), 0x4) 17:50:31 executing program 1: select(0x40, &(0x7f0000001500), 0x0, &(0x7f0000001580)={0x3}, &(0x7f00000015c0)) 17:50:31 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:31 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0xa) 17:50:32 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001680)=[@rights], 0x10}, 0x0) 17:50:32 executing program 1: open$dir(&(0x7f0000000300)='./file0\x00', 0x8efd68fe674a9ffd, 0x0) 17:50:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_cred(r0, 0xffff, 0x1022, 0xffffffffffffffff, 0x0) 17:50:32 executing program 4: socket(0x1, 0x2, 0x1) 17:50:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:32 executing program 5: socketpair(0x1, 0x2, 0x1, &(0x7f0000000200)) 17:50:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000100), 0x10) 17:50:32 executing program 0: r0 = socket(0x1e, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000000000), 0x4) 17:50:32 executing program 4: setuid(0xffffffffffffffff) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) 17:50:32 executing program 5: r0 = socket(0x1, 0x1, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 17:50:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}]}, 0xe) 17:50:32 executing program 0: r0 = socket(0x18, 0x3, 0x0) r1 = socket(0x18, 0x3, 0x0) r2 = getpid() fcntl$setown(r1, 0x6, r2) fcntl$setown(r0, 0x6, r2) 17:50:32 executing program 5: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0xfce7, &(0x7f0000000400)=[{&(0x7f0000000100)="9a50f32f2968d1c163abc2986b05f6ade760db0a6e8f9575132a86c3e3e42e553d4c3b7e8e2235fa121b9641389a6f246f6a24e7a6bb0407c67704f6ebc89848a769a965b726827d7026fe13401372ca9550c17104439fdb70e079d8a71428ea544b200a338af86f151fca65f0cbc55c7cad3017", 0x74}, {&(0x7f0000000280)="5bd37ddf430e1f00bfb666726d1295163a194d1a46b5e89b1518ff498662d24d6bdb9d9cefb9715ec1c6521cfe10d91a3d86c8dafa52d40f356944c1ab36a502f0cd4d9d073dedafe789231f9a6a92c1755d43f9786402d3b1bc49e4dc411301741cc9f6f736d52088bdd347724e3240132979b1b741b5fe7f638ae56e689d208970e41dce55500000006b015f6bc6757128515353940fcea71a11f82504af742c16548c32ae090c027bb12a88d3b6d28ba71a29daedad86e832be7c2e6d847e79595110e123a4", 0xc7}, {&(0x7f0000000240)="442f085b4038f0ed984dcaa1b8153a927635833cfe9d12bdfffa55", 0x1b}, {&(0x7f0000000740)="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", 0xee8}], 0x10000000000002d4}, 0x0) 17:50:32 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:32 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2b, 'rdma'}]}, 0xe) 17:50:32 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:32 executing program 5: lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) rmdir(&(0x7f0000000000)='.\x00') chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 17:50:33 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x0, 0xfffffffffffffffe}, {0x0, 0xfffffffffffffffe}}, 0x0) 17:50:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:33 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x2d, 'io'}, {0x0, 'rdma'}]}, 0x12) 17:50:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:33 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x0, 0x5d800000}, 0x8) 17:50:33 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x3}, 0x8) 17:50:33 executing program 5: r0 = socket(0x1, 0x1, 0x0) getsockopt(r0, 0x0, 0x0, 0x0, 0x0) 17:50:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:33 executing program 1: r0 = socket(0x1e, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:50:33 executing program 5: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getdents(r0, 0x0, 0x0) 17:50:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:33 executing program 0: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0xe, 0x0) 17:50:33 executing program 4: r0 = socket(0x2, 0x3, 0x0) getsockopt(r0, 0x0, 0xa, 0x0, 0x0) 17:50:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:33 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x9edca46f3c595b2e, 0x0) 17:50:33 executing program 5: r0 = socket(0x1e, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000016c0), 0x8) 17:50:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2d, 'memory'}, {0x0, 'rdma'}]}, 0xe) 17:50:33 executing program 0: select(0x0, 0x0, &(0x7f0000001540), &(0x7f0000001580), &(0x7f00000015c0)) 17:50:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:33 executing program 1: setuid(0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) 17:50:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) rmdir(&(0x7f0000000200)='./file1\x00') 17:50:33 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 17:50:33 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'rdma'}]}, 0x6) 17:50:34 executing program 0: r0 = socket(0x1e, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 17:50:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:34 executing program 1: r0 = socket(0x1e, 0x3, 0x0) write(r0, &(0x7f0000000000)="b98221c384964c470ffa1e6d85a9f946338b593a09aa24e74784a6fa5e27af2fb7e6eb97c15b5100737ea172a6370942abd0390b9cfdd8f263f3d10262d4501da4446b63aac3b3bef7b4d03e14fbb2695e39f27f87d3b2ba414f30bb93b074afc12a6abab1ef1f902815b8445c5f8a338cfc06a81f48d1baf6d453ef336c35171a61b33604840d86f0178a43b22ca2a262", 0x91) 17:50:34 executing program 5: r0 = socket(0x1, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 17:50:34 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCMBIS(r1, 0x8004746c, &(0x7f0000000d00)) 17:50:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4d5bfa4d6eef6b02, 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 17:50:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'rdma'}]}, 0x6) 17:50:34 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs, 0x8) 17:50:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:34 executing program 5: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xe06ec00000000000}) 17:50:34 executing program 0: setuid(0xffffffffffffffff) shmget(0x2, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) 17:50:34 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0xa47ed3c52aec5d65, 0x0) 17:50:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x2b, 'rdma'}]}, 0x6) 17:50:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto(r0, &(0x7f00000010c0)="87c91a32d2e82731366f00ac41b3dd7019398467564666622495e63b2db688e95c29362ae69eafacc29f258a3a5ca38374a8b2fd3e506e72e4cae2e319ba37d6c530ae7645395a807cda6f9a336103315ad54a34a0dda6e5f6b0218af131ceada6b0dc7f12ad82f60077215835d87f5d66a2a8af4bdd244b91d75f2616677bf4ae339ff79298ee9f62239c4c467f05385c", 0x91, 0x409, 0x0, 0x0) 17:50:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, &(0x7f0000000200)) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:34 executing program 5: select(0x0, 0x0, 0x0, &(0x7f0000001580), &(0x7f00000015c0)) 17:50:34 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto(r0, &(0x7f00000010c0)="87c91a32d2e82731366f00ac41b3dd7019398467564666622495e63b2db688e95c29362ae69eafacc29f258a3a5ca38374a8b2fd3e506e72e4cae2e319ba37d6c530ae7645395a807cda6f9a336103315ad54a34a0dda6e5f6b0218af131ceada6b0dc7f12ad82f60077215835d87f5d66a2a8af4bdd244b91d75f2616677bf4ae339ff79298ee9f62239c4c467f05385c", 0x91, 0x0, &(0x7f0000001080)=@in={0x2, 0x2}, 0xc) 17:50:34 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCSWINSZ(r1, 0x80087467, &(0x7f0000000000)) 17:50:34 executing program 1: getrlimit(0xb, 0x0) 17:50:34 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:34 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x18fd) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 17:50:34 executing program 4: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa) 17:50:34 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)='j', 0x1}, {&(0x7f0000000300)="d6", 0x1}], 0x2}, 0xc) 17:50:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:34 executing program 1: setuid(0xffffffffffffffff) msgget(0x1, 0xa2) 17:50:35 executing program 5: socket(0x21, 0x0, 0x7) 17:50:35 executing program 4: setuid(0xffffffffffffffff) r0 = shmget(0x1, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 17:50:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:35 executing program 0: recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/187, 0xbb, 0x0, 0x0, 0xfffffe0d) 17:50:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:35 executing program 1: r0 = socket(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x1, 0x0, 0x0) 17:50:35 executing program 5: r0 = socket(0x2, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000001100)) 17:50:35 executing program 4: r0 = socket(0x2, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000000), 0x4) 17:50:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) write$cgroup_subtree(r1, &(0x7f0000000180)={[{0x0, 'rdma'}]}, 0x6) 17:50:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto(r0, &(0x7f00000010c0)="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", 0x171, 0x0, &(0x7f0000001080)=@in={0x2, 0x2}, 0xc) 17:50:35 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:50:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:35 executing program 5: r0 = socket(0x1e, 0x3, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) 17:50:35 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TIOCGWINSZ(r1, 0x40087468, &(0x7f00000001c0)) 17:50:35 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x4, &(0x7f0000000000), 0x4) 17:50:35 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x2a2, 0x0) 17:50:35 executing program 0: select(0x40, &(0x7f00000001c0)={0x6}, 0x0, 0x0, 0x0) 17:50:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:35 executing program 4: open$dir(&(0x7f0000000300)='./file0\x00', 0x8efd68fe674a9ffd, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 17:50:35 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x8000) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 17:50:35 executing program 1: utimensat(0xffffffffffffffff, 0x0, 0x0, 0xdb8fc66e6d965c66) 17:50:35 executing program 2: r0 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1003, &(0x7f0000000000), 0x4) 17:50:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:36 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) 17:50:36 executing program 4: open$dir(&(0x7f0000000080)='./file0\x00', 0xb50, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 17:50:36 executing program 2: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) symlinkat(&(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f0000000140)='./file0\x00') 17:50:36 executing program 1: r0 = socket(0x2, 0x1, 0x0) shutdown(r0, 0x0) 17:50:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:36 executing program 0: unlinkat(0xffffffffffffffff, 0xfffffffffffffffe, 0x0) 17:50:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f00000000c0)) 17:50:36 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x18, 0x3}, 0xc) 17:50:36 executing program 5: r0 = socket(0x1e, 0x3, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000001100)={0x2, 0x2}, 0xc) 17:50:36 executing program 1: setuid(0xffffffffffffffff) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20, 0x0) 17:50:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4d5bfa4d6eef6b02, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x2, 0x0) 17:50:36 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8000, 0x10000200) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 17:50:36 executing program 0: nanosleep(&(0x7f00000000c0), 0x0) clock_gettime(0x3, &(0x7f0000000080)) 17:50:36 executing program 5: r0 = socket(0x2, 0x1, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 17:50:36 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) listen(r0, 0x0) 17:50:36 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:50:37 executing program 4: msgctl$IPC_SET(0xffffffffffffffff, 0x1, 0x0) fork() 17:50:37 executing program 2: getsockname$inet(0xffffffffffffff9c, 0x0, 0x0) 17:50:37 executing program 1: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', r0, &(0x7f0000000140)='./file0\x00') 17:50:37 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) connect$unix(r0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x3}, 0x8) 17:50:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:37 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) 17:50:37 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 17:50:37 executing program 0: readlink(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:50:37 executing program 2: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740)) 17:50:37 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 17:50:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:37 executing program 5: open$dir(&(0x7f0000001340)='./file0\x00', 0x0, 0x0) 17:50:37 executing program 2: faccessat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x0) 17:50:37 executing program 1: fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x600) 17:50:37 executing program 4: select(0x40, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x7}, &(0x7f00000000c0), 0x0) 17:50:37 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc) 17:50:37 executing program 5: fchmodat(0xffffffffffffffff, 0x0, 0x0) 17:50:37 executing program 1: getgroups(0x1, &(0x7f0000000680)=[0x0]) 17:50:37 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000a00)='./file0\x00', 0x0, 0x0) 17:50:37 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:37 executing program 4: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000100)) 17:50:37 executing program 0: r0 = semget$private(0x0, 0x0, 0x200) semctl$GETZCNT(r0, 0x0, 0x7, 0x0) fork() 17:50:37 executing program 5: setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000a80), 0x4) 17:50:37 executing program 2: semctl$GETZCNT(0x0, 0x0, 0x7, 0x0) 17:50:37 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000980)) 17:50:38 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) fork() msgctl$IPC_SET(0x0, 0x1, 0x0) 17:50:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:38 executing program 2: unlinkat(0xffffffffffffffff, &(0x7f0000001580)='./file0\x00', 0x0) 17:50:38 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) preadv(r0, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 17:50:38 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20, 0x0) 17:50:38 executing program 0: socketpair(0x18, 0x3, 0x5, 0x0) 17:50:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:38 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSCTTY(r0, 0x20007461, 0x0) 17:50:38 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x0) 17:50:38 executing program 2: poll(&(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0xffffffff) 17:50:38 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r2}, {r1}, {}, {r0, 0x6}, {}, {r0, 0x40}, {r0, 0x1}, {}, {}, {}], 0xa, 0xffffffff) 17:50:38 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x4004667f, 0x0) 17:50:38 executing program 1: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4}, 0x0) 17:50:38 executing program 4: accept(0xffffffffffffff9c, &(0x7f0000000840)=@un=@abs, 0x0) 17:50:38 executing program 0: r0 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000040)=""/84) 17:50:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:38 executing program 1: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 17:50:38 executing program 4: accept(0xffffffffffffff9c, &(0x7f0000000840)=@un=@abs, &(0x7f0000000880)=0x8) 17:50:38 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) 17:50:38 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000ff2000/0xe000)=nil, 0x0) 17:50:38 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}, {0x2b, 'memory'}]}, 0x26) 17:50:39 executing program 2: ioctl$TIOCSPGRP(0xffffffffffffff9c, 0x40047477, 0x0) 17:50:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000080)) 17:50:39 executing program 4: r0 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_STAT(r0, 0x2, 0x0) 17:50:39 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 17:50:39 executing program 5: ioctl$TIOCSPGRP(0xffffffffffffff9c, 0x40047477, 0x0) pipe(&(0x7f0000000080)) 17:50:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = dup(r0) preadv(r1, &(0x7f0000000200)=[{0x0}, {&(0x7f00000000c0)=""/25, 0x19}], 0x2, 0x0, 0x0) 17:50:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, 0x0, 0x0) 17:50:39 executing program 1: poll(&(0x7f0000000100)=[{}], 0x1, 0x0) 17:50:39 executing program 2: socketpair(0x0, 0x0, 0x5, 0x0) 17:50:39 executing program 0: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) 17:50:39 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001600)=[{&(0x7f0000000280)="f6", 0x1}, {&(0x7f0000000180)='N', 0x1}], 0x2) 17:50:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, 0x0, 0x0) 17:50:39 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) lseek(r0, 0x0, 0x0) 17:50:39 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) dup2(r0, r0) 17:50:39 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:50:39 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 17:50:39 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000440)=""/231, 0xe7) 17:50:39 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001600)=[{0x0}, {&(0x7f0000000180)='N', 0x1}], 0x2) 17:50:39 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, 0x0, 0x0) 17:50:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/null\x00', 0x0, 0x0) symlinkat(&(0x7f0000000a80)='./file0\x00', r0, &(0x7f0000000b00)='./file0\x00') 17:50:40 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001600)=[{0x0}], 0x1) 17:50:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0xa, r1) dup(r2) 17:50:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x2d, 'pids'}]}, 0x1e) 17:50:40 executing program 2: semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)) 17:50:40 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$getflags(r0, 0x3) 17:50:40 executing program 1: socketpair(0x26, 0x0, 0x3, 0x0) 17:50:40 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) pwritev(r0, &(0x7f0000000040)=[{0x0}], 0x1, 0x0, 0x0) 17:50:40 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 17:50:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$lock(r0, 0x8, 0x0) 17:50:40 executing program 5: mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 17:50:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x18) 17:50:40 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x1014, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x3, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1007, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:50:40 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r0, 0x5) 17:50:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/null\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000f80)=[{0x0}], 0x1, 0x0, 0x0) 17:50:40 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() fcntl$setown(r0, 0x6, r1) 17:50:40 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000100)=[{}, {r1}, {}, {r0, 0x6}, {}, {r0, 0x40}, {r0, 0x1}, {}, {}, {}], 0xa, 0xffffffff) 17:50:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x18) 17:50:40 executing program 1: utimensat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900), 0x0) 17:50:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = dup(r0) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000040)=""/101, 0x65}, {&(0x7f00000000c0)=""/25, 0x19}, {0x0}], 0x3, 0x0, 0x0) 17:50:40 executing program 2: lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) lchown(&(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff, 0x0) 17:50:40 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000f80)=[{0x0}], 0x1, 0x0, 0x0) 17:50:40 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0x0) 17:50:40 executing program 5: utimensat(0xffffffffffffffff, &(0x7f00000008c0)='./file0\x00', 0x0, 0x0) 17:50:40 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0) 17:50:40 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}]}, 0x18) 17:50:41 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) getpeername(r2, 0x0, 0x0) 17:50:41 executing program 1: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 17:50:41 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x2000747a) 17:50:41 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x8000, 0x0) open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) 17:50:41 executing program 5: r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/231, 0xe7}], 0x1, 0x0, 0x0) close(r0) 17:50:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:41 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) 17:50:41 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) fchmod(r0, 0x0) 17:50:41 executing program 1: r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000180), 0x1000000000000034, 0x0, 0x0) 17:50:41 executing program 2: open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) 17:50:41 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x1006, 0x0, 0x0) 17:50:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001500)={&(0x7f0000001240)=@file={0x0, './file2\x00'}, 0xa, 0x0}, 0x0) 17:50:41 executing program 4: setuid(0xffffffffffffffff) open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) 17:50:41 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'pids'}]}, 0x18) 17:50:41 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:50:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 17:50:41 executing program 4: r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0xc600000000000000) 17:50:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) 17:50:42 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001500)={&(0x7f0000001240)=@file={0x0, './file2\x00'}, 0xa, &(0x7f0000001340)=[{&(0x7f0000001280)="bda82d0f1717c155d190e6d8fdd9a5edb4f442ac6ed71bc16a4324abc20d75dd127867db565e07cf278c5be4ffb88c53a125382ad181a26dfb4a7b48eef12b45c617b9b77a543694adf29a73c58485b992b7edd757de4170f706357dec50432edcdbfe3d1a519286c13ee7271973b47e45e785da3d052b004d48b0b5fc9bce29ec4356e22fa9846d29d36731593e07cd21", 0x91}], 0x1, &(0x7f0000001480)=[@cred], 0x20}, 0x0) 17:50:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'pids'}]}, 0x18) 17:50:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) 17:50:42 executing program 1: open$dir(&(0x7f0000001200)='./file1\x00', 0x0, 0x0) 17:50:42 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:50:42 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:50:42 executing program 0: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0xc600) 17:50:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'pids'}]}, 0x18) 17:50:42 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) chown(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 17:50:42 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x8000, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xffffffffffffff9c, 0x0, 0x0) 17:50:42 executing program 0: clock_gettime(0x2, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000040)) 17:50:42 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000040)) 17:50:42 executing program 2: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 17:50:42 executing program 1: setrlimit(0x2, &(0x7f00000000c0)={0x60000000, 0x60000000}) 17:50:42 executing program 5: open$dir(&(0x7f0000001200)='./file1\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file1\x00', 0xff592ec2e306a86d, 0x0) 17:50:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:42 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0) 17:50:42 executing program 2: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 17:50:42 executing program 4: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000001100)={{0x0, 0xffffffffffffffff}, {0x0, 0xfffffffffffffffe}}, 0x0) 17:50:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[@cred], 0x20}, 0x0) 17:50:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:42 executing program 5: open$dir(&(0x7f00000000c0)='.\x00', 0x202, 0x0) 17:50:42 executing program 2: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 17:50:42 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file1\x00', 0x200, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=""/231, 0xe7}], 0x1, 0x0, 0x0) open$dir(&(0x7f0000001280)='./file1\x00', 0x0, 0x0) close(r0) 17:50:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001240)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f00000012c0)=""/66, 0x42}, 0x0) 17:50:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001240)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 17:50:43 executing program 2: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 17:50:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x0, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:43 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) open$dir(&(0x7f0000000400)='./file0/file0\x00', 0x0, 0x0) 17:50:43 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x8000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 17:50:43 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0xc) 17:50:43 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000080)=0x8) close(r0) 17:50:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x16) 17:50:43 executing program 4: recvfrom(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0) 17:50:43 executing program 2: open$dir(&(0x7f00000000c0)='.\x00', 0xa00, 0x0) 17:50:43 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000080)=0x7) close(r0) 17:50:43 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x16) 17:50:43 executing program 1: syz_open_dev$hidraw(&(0x7f00000000c0)='/dev/hidraw#\x00', 0x0, 0x318840) r0 = syz_open_dev$hidraw(&(0x7f0000000a40)='/dev/hidraw#\x00', 0x0, 0x20240) ioctl$HIDIOCSFEATURE(r0, 0xc0404806, &(0x7f0000000a80)="e37322602ff4df571e84c161ce640550a6354f933e6e9294801523e997dab83b52b9918152c04db3765e") syz_usb_control_io(0xffffffffffffffff, &(0x7f0000002000)={0x2c, &(0x7f0000001dc0)={0xaa936a1b7fd18699, 0x31, 0xa7, {0xa7, 0xf, "5980fb60d6f62a24f081eaf3a3d51d8801349f088106b1333453925674614721cf504fbdf66661e84d88d2dfbd9045907fe70b6be6d67bf360c1d660e9883d11f694bdbfc8db24a59a8e2afc5cf756eeec6c3523047ecc7f7280910c3b3687a91d1d50b0819e7ac130b9dc9e1c37f0022c88c8ef9aca503d0fa97fe38dc8a666f88f8b3f5cf2d6bf58c52033709c7018ed1e21c7f1f1e50e9e462466a9e98f64944ba5b880"}}, &(0x7f0000001e80)={0x0, 0x3, 0x9f, @string={0x9f, 0x3, "664d61dba9086bf63e183d21800d9b431e279d29583bc10f541a029d7d245b5701418997f0a298b833430cc9a80b70089dbbf2484dc80c897eac5428dc3d56181e42bee49d5e8293f8003d921168c86f809774805c6f7f5390394e6af5a47b0983c4453dc7332ec5fefb50ae9c3183689193b2226e7a010fc4c722365c6de06b8cb63071fa1148612d8b36a80b9759c4672b9262fc09f49a30af4b525d"}}, &(0x7f0000001f40)={0x0, 0xf, 0x5, {0x5, 0xf, 0x5}}, &(0x7f0000001f80)={0x20, 0x29, 0xf, {0xf, 0x29, 0x2, 0x2, 0xff, 0x11, "c3e33bdb", "30b47f28"}}, &(0x7f0000001fc0)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x1, 0x1, 0x0, 0x3, 0xfb, 0x4, 0x9d8}}}, &(0x7f00000024c0)={0x84, &(0x7f0000002040)={0x20, 0x7, 0xa0, "fab1220f99842edfb808a00e5cca6061afbd9c6eef77bfc62da927d9009acc976df1c5abd82b88c2c560299dcf597a2df6cf3826ebe817605d11877962aef5a59c6d457f81b6298cb3ebeb2ac84d4a8405fa7f5caf288b6b6a5887a0fcf5a5bd250d13924b8fdd5286c1120e07d383076f6781dc9882085f22f2f63789e72ddbf33112b2f5e91ee5f46bb5a4fe43dcbed8d5ce95e79a260a9f8c742d48732295"}, &(0x7f0000002100)={0x0, 0xa, 0x1, 0x3}, &(0x7f0000002140)={0x0, 0x8, 0x1, 0x3}, &(0x7f0000002180)={0x20, 0x0, 0x4, {0x2, 0x3}}, &(0x7f00000021c0)={0x20, 0x0, 0x4, {0x2, 0x20}}, &(0x7f0000002200)={0x40, 0x7, 0x2, 0x7}, &(0x7f0000002240)={0x40, 0x9, 0x1, 0x2}, &(0x7f0000002280)={0x40, 0xb, 0x2, "6f0f"}, &(0x7f00000022c0)={0x40, 0xf, 0x2, 0x6b}, &(0x7f0000002300)={0x40, 0x13, 0x6}, &(0x7f0000002340)={0x40, 0x17, 0x6, @local}, &(0x7f0000002380)={0x40, 0x19, 0x2, "fd20"}, &(0x7f00000023c0)={0x40, 0x1a, 0x2, 0x1}, &(0x7f0000002400)={0x40, 0x1c, 0x1, 0x7f}, &(0x7f0000002440)={0x40, 0x1e, 0x1, 0x3}, &(0x7f0000002480)={0x40, 0x21, 0x1, 0x7f}}) ioctl$HIDIOCGCOLLECTIONINFO(0xffffffffffffffff, 0xc0104811, &(0x7f00000025c0)={0x400, 0x7, 0x3, 0x7}) syz_open_dev$evdev(&(0x7f0000002600)='/dev/input/event#\x00', 0x2, 0x4001) 17:50:44 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSPGRP(r0, 0x40047477, &(0x7f0000000080)) 17:50:44 executing program 4: syz_open_dev$evdev(&(0x7f0000000940)='/dev/input/event#\x00', 0x0, 0x208c0) 17:50:44 executing program 2: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0xf68, 0x0) syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x0, 0x169280) 17:50:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a00)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1006, 0x0, 0x0) 17:50:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x16) 17:50:44 executing program 4: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000001140)=""/4104, 0x1008) 17:50:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x81, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) 17:50:44 executing program 2: syz_open_dev$hiddev(&(0x7f00000010c0)='/dev/usb/hiddev#\x00', 0x0, 0x0) syz_open_dev$hiddev(&(0x7f0000003480)='/dev/usb/hiddev#\x00', 0x0, 0x42) 17:50:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:44 executing program 5: ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) 17:50:44 executing program 0: syz_open_dev$evdev(&(0x7f0000001240)='/dev/input/event#\x00', 0x0, 0x4000) r0 = syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x81, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, 0x0) syz_open_dev$evdev(&(0x7f0000001700)='/dev/input/event#\x00', 0x0, 0x10000) 17:50:44 executing program 1: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1ff, 0x0) 17:50:44 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000180)=""/10) 17:50:44 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x208000) 17:50:44 executing program 5: syz_open_dev$evdev(&(0x7f0000001240)='/dev/input/event#\x00', 0x0, 0x4000) 17:50:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000780)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000900)=""/171) 17:50:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:44 executing program 2: syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) 17:50:44 executing program 5: syz_open_dev$evdev(&(0x7f0000001680)='/dev/input/event#\x00', 0x0, 0x0) 17:50:44 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000016c0)=""/36) 17:50:44 executing program 4: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) 17:50:44 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'rdma'}, {0x0, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:44 executing program 1: clock_adjtime(0x0, &(0x7f0000000000)={0x1}) 17:50:45 executing program 0: sched_setattr(0x0, 0x0, 0x0) 17:50:45 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002140)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000002180)=ANY=[@ANYBLOB="90000000", @ANYRES64], 0x90) 17:50:45 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000100)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @loopback}}) 17:50:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syzkaller0\x00', 0x10) 17:50:45 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f0000000000)=0x5) 17:50:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x18) 17:50:45 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 17:50:45 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002140)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000002180)=ANY=[], 0x90) 17:50:45 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50}, 0x50) 17:50:45 executing program 5: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000022c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000002300)) 17:50:45 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', r0) 17:50:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x18) 17:50:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894a, &(0x7f00000000c0)={'syzkaller1\x00', @ifru_flags}) 17:50:45 executing program 5: socketpair(0x23, 0x0, 0x0, 0x0) 17:50:45 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000002600)=@req={0x28, &(0x7f00000025c0)={'ip6gretap0\x00', @ifru_settings={0x0, 0x0, @fr=0x0}}}) 17:50:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x5, 0x0, &(0x7f00000002c0)) 17:50:45 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8910, &(0x7f0000000040)={'batadv_slave_0\x00', @ifru_map}) 17:50:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x18) 17:50:45 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000100)=ANY=[@ANYBLOB="0520000018"]) 17:50:45 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000002480)={0x2020}, 0x2020) 17:50:45 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)=""/75, 0x4b}], 0x1}, 0x0) 17:50:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='macvlan1\x00', 0x10) 17:50:45 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='veth1_vlan\x00') 17:50:45 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x0, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 17:50:45 executing program 2: r0 = getpgrp(0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) 17:50:45 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000040)={'syz_tun\x00', @ifru_ivalue}) 17:50:45 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000080)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a05632c4"}, 0x0, 0x0, @planes=0x0}) 17:50:45 executing program 5: perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) creat(0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r1, 0x8200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x64) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200000, 0x0) ioctl$CHAR_RAW_RAGET(r2, 0x1263, &(0x7f00000000c0)) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0)=[{{0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x2}, 0x81}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=""/34, 0x22}}, {{&(0x7f0000001900)=@nl, 0x80, 0x0}, 0x2}, {{&(0x7f0000003380)=@ethernet={0x0, @link_local}, 0x80, 0x0}}], 0x4, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 17:50:46 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000240)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4bcfc665"}, 0x0, 0x0, @userptr}) 17:50:46 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 17:50:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x0, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:46 executing program 1: socketpair(0x10, 0x3, 0x1, 0x0) 17:50:46 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000002100)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x11}, 0x31) 17:50:46 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "05beec57"}, 0x0, 0x0, @planes=0x0}) 17:50:46 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) 17:50:46 executing program 1: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$sock_int(r0, 0x1, 0x26, 0x0, &(0x7f0000000040)) 17:50:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2d, 'io'}, {0x0, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:46 executing program 2: clock_gettime(0x1, &(0x7f0000000c40)) 17:50:46 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "05beec57"}, 0x0, 0x0, @planes=0x0}) 17:50:46 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 17:50:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)=@in={0x2, 0x0, @loopback}, 0x80) 17:50:46 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000400)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000000)={0x0, 0xa, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "ec86c865"}, 0x0, 0x0, @fd}) 17:50:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'sit0\x00', 0x0}) 17:50:46 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto(r0, 0x0, 0x0, 0x200000c1, 0x0, 0x0) 17:50:46 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "05beec57"}, 0x0, 0x0, @planes=0x0}) 17:50:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1a) 17:50:46 executing program 4: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @remote, 0x0, 0x1, 'sh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000001280)={0x20000000000084, @private, 0x0, 0x200000001, 'none\x00'}, 0x2c) 17:50:46 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x10}, 0x10) 17:50:46 executing program 1: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000001500)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000000c0)='v', 0x1}, {&(0x7f0000000100)='n', 0x1}], 0x2}, 0x0) 17:50:46 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x9, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "05beec57"}, 0x0, 0x0, @planes=0x0}) 17:50:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 17:50:46 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1a) 17:50:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000000)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x28, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'batadv_slave_0\x00'}]}, 0x28}}, 0x0) 17:50:47 executing program 4: r0 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "2961e504"}, 0x0, 0x0, @planes=0x0}) 17:50:47 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000000)={0x5}) 17:50:47 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 17:50:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1a) 17:50:47 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) sendmmsg(r0, &(0x7f00000038c0), 0x4000000000000a8, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) 17:50:47 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000440)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f00000024c0)={0x18}, 0x18) 17:50:47 executing program 1: socketpair(0x25, 0x0, 0x41, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) socket$l2tp6(0xa, 0x2, 0x73) 17:50:47 executing program 4: mkdir(0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff9c, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f00000004c0)='sit0\x00') r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x84, @remote, 0x4e24, 0x1, 'sh\x00'}, 0x2c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000001280)={0x20000000000084, @private, 0x0, 0x200000001, 'none\x00'}, 0x2c) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) setxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@known='system.sockprotoname\x00', &(0x7f0000000580)='\x00', 0x1, 0x2) setxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.redirect\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x81, 0x1, 0x1e, 0xe1, 0x0, 0x0, 0x26840, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6000, 0x2, @perf_config_ext={0xffffffff, 0x1}, 0x340, 0x3f, 0x5f, 0x3, 0x6, 0xa2, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x2) socket$nl_route(0x10, 0x3, 0x0) 17:50:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:47 executing program 0: syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x268040) 17:50:47 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000100)=0x40) 17:50:47 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x80) 17:50:47 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev}}) 17:50:47 executing program 4: getsockname$l2tp6(0xffffffffffffffff, 0x0, 0x0) 17:50:47 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000100), &(0x7f00000000c0)=0xffffffffffffff15) 17:50:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:47 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, &(0x7f0000000580)=[{&(0x7f0000001640)=""/4081, 0xff1}, {&(0x7f0000000080)=""/75, 0x4b}], 0x2}, 0x0) 17:50:47 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000140)={'caif0\x00', {0x2, 0x0, @multicast2}}) 17:50:47 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) lchown(0x0, 0x0, 0xee01) 17:50:47 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) 17:50:47 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x5) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000000)="d7d88730d82979ed3658ddca6fd8edde1d5afad114eb3d735258c4f9b96a54cadf82886d", 0x24}], 0x1) 17:50:47 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="580000000101", @ANYRES32], 0x58}}, 0x0) 17:50:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) sendmsg(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={0xffffffffffffffff, 0xc0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)={0x4, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) mkdirat$cgroup(r1, 0x0, 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r2, &(0x7f0000000180)={[{0x0, 'io'}, {0x2b, 'rdma'}, {0x2b, 'memory'}, {0x2b, 'rdma'}, {0x0, 'pids'}]}, 0x1e) 17:50:47 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x20, &(0x7f0000000180)=[@in={0x2, 0x4e21, @dev}, @in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000240)=0xc) 17:50:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, [@IFLA_XDP={0xc, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8}]}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) [ 247.297244][T13194] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.362179][T13194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.386516][T13194] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:48 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x28011, r0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa8, 0xa8, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}]}, @fwd, @const, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{0x8}, {}, {}, {}]}, @array]}}, 0x0, 0xc2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 247.409415][T13204] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.2'. 17:50:48 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8953, &(0x7f0000000000)) 17:50:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae91, &(0x7f0000000240)) [ 247.543390][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 17:50:48 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 247.585757][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.621104][T13206] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 247.674032][T13213] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 17:50:48 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b26, &(0x7f0000000040)='wlan1\x00') 17:50:48 executing program 0: ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000000)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ttyS3\x00', 0x4000, 0x0) [ 247.717564][T13217] ptrace attach of "/root/syz-executor.0"[13209] was attempted by "/root/syz-executor.0"[13217] [ 247.737849][T13208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.793581][T13208] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 247.856437][T13208] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000000000/0x6000)=nil, 0x7000) ioctl$EVIOCSCLOCKID(r0, 0x5421, &(0x7f0000000000)) 17:50:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae03, 0x0) 17:50:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x80084503, 0x0) 17:50:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x28011, r0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{0xe}, {}, {}, {}, {}, {}, {}, {}]}, @fwd, @const, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @array]}}, 0x0, 0xfe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 247.932074][T13220] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 247.970618][T13220] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 17:50:48 executing program 0: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x1e, 0x0, 0x300) [ 248.006432][T13220] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 17:50:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x41a0ae8d, 0x0) 17:50:48 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) write$vga_arbiter(r0, 0x0, 0x0) 17:50:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x5000aea5, &(0x7f0000000240)) 17:50:48 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x14, 0x0, 0x0) 17:50:48 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0xc028ae92, &(0x7f00000000c0)={{0x0, 0x0, 0x80}, "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", "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"}) [ 248.211734][T13247] ptrace attach of "/root/syz-executor.3"[13234] was attempted by "/root/syz-executor.3"[13247] 17:50:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 17:50:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x38) 17:50:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000240)={0xaf}) 17:50:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4004ae86, &(0x7f00000000c0)={{0x0, 0x0, 0x80}, "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", "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"}) 17:50:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc008ae09, 0x544048) 17:50:49 executing program 0: r0 = socket(0x1, 0x3, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsu\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5411, &(0x7f0000000880)) 17:50:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:50:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 17:50:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000140)) ioctl$EVIOCSCLOCKID(r0, 0x40044591, 0x0) 17:50:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x28011, r0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15d, 0x15d, 0x2, [@func_proto={0x0, 0x8, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, @fwd, @const, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {0xb}, {}, {}]}, @datasec={0x0, 0xa, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 'Y'}]}}, 0x0, 0x17a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 17:50:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x19, 0x0, 0x0) 17:50:49 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x3e, 0x0, 0x0) [ 248.847859][T13301] rtc_cmos 00:00: Alarms can be up to one day in the future [ 248.898159][T13301] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 17:50:49 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x18, 0x0, 0x0) 17:50:49 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 17:50:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 17:50:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="1b4bdb684ed854a06a9762d5f31bd0038438eca5ff359464495c5af479fd1813c7aa15fc6994b89ae7d24196ac8e25c3ecb9d43151250840e197859b13ce4946c75dec2bf7d53053d9766876f2a792890aa88b4a82b632f351ece2cca21fb2908613f997cb45badc813bb2311a2b69dcf69e3b4cc402b29f7d1e42a0d047443157b80f21473fe22f5bfafe06b1d7e45ae4a954d10000bf1b23bdda7ab336d9f478a3025a34db35b8718be9f1ee925014b54b50872758dbd0d28016ce755e04400f0fd73116b02ec81ebcb3218f8bc2d68a9a0bb08cddd5e33579f2b2855d966aaef47b8114685b92887084d0aae10aa916725455232c997582fae7087b8b32667503728603d203ce585017dcd4482bfffff6f5718359c3a82d10f2c50926f1cd5770b69791c7f9d43e2bcd159a50eed16048a9f6c8cb0f92b1d1890eaf117937e1d53e675eb99657c1227a64b74ebd3c5fa1fb043c3de24c"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:50:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:50:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 249.130529][T13327] ptrace attach of "/root/syz-executor.0"[13315] was attempted by "/root/syz-executor.0"[13327] 17:50:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) [ 249.325630][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 249.343601][T13338] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 249.352268][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future 17:50:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 249.384411][T13339] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. [ 249.421489][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future 17:50:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) [ 249.462385][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 249.511214][ T9725] rtc rtc0: __rtc_set_alarm: err=-22 [ 249.529401][T13348] rtc_cmos 00:00: Alarms can be up to one day in the future [ 249.577867][T13340] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 17:50:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) 17:50:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 249.704912][T13365] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. [ 249.954512][T13382] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. 17:50:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:50 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x28011, r0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x129, 0x129, 0x2, [@fwd, @const, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0xa, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 'Y'}, @array]}}, 0x0, 0x146}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 17:50:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:50:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) 17:50:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) [ 250.326626][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 250.360714][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future 17:50:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="1b4bdb684ed854a06a9762d5f31bd0038438eca5ff359464495c5af479fd1813c7aa15fc6994b89ae7d24196ac8e25c3ecb9d43151250840e197859b13ce4946c75dec2bf7d53053d9766876f2a792890aa88b4a82b632f351ece2cca21fb2908613f997cb45badc813bb2311a2b69dcf69e3b4cc402b29f7d1e42a0d047443157b80f21473fe22f5bfafe06b1d7e45ae4a954d10000bf1b23bdda7ab336d9f478a3025a34db35b8718be9f1ee925014b54b50872758dbd0d28016ce755e04400f0fd73116b02ec81ebcb3218f8bc2d68a9a0bb08cddd5e33579f2b2855d966aaef47b8114685b92887084d0aae10aa916725455232c997582fae7087b8b32667503728603d203ce585017dcd4482bfffff6f5718359c3a82d10f2c50926f1cd5770b69791c7f9d43e2bcd159a50eed16048a9f6c8cb0f92b1d1890eaf117937e1d53e675eb99657c1227a64b74ebd3c5fa1fb043c3de24c"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:50:51 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x8914, &(0x7f0000000000)) [ 250.383077][T13404] ptrace attach of "/root/syz-executor.4"[13395] was attempted by "/root/syz-executor.4"[13404] [ 250.397350][T13403] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.5'. [ 250.413594][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future 17:50:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 250.483065][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 250.503085][ T9725] rtc rtc0: __rtc_set_alarm: err=-22 [ 250.517352][T13408] rtc_cmos 00:00: Alarms can be up to one day in the future [ 250.552289][T13397] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.0'. 17:50:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) 17:50:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x81a0ae8c, &(0x7f0000000240)) [ 250.667806][T13418] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.1'. 17:50:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000500)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x800, 0x20, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x6, 0x2}) lseek(r0, 0xff01, 0x3) mount(&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000100)='squashfs\x00', 0x1104003, &(0x7f00000001c0)='memory.events\x00') r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x2000, 0x0) r4 = openat(r3, &(0x7f0000000380)='./file0/../file0\x00', 0x80, 0x9) ioctl$RTC_UIE_ON(r2, 0x7003) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x2b, 0x19, 0x12, 0xd, 0x8, 0x10000, 0x0, 0x0, 0x1}}) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$BTRFS_IOC_GET_FEATURES(r2, 0x80189439, &(0x7f00000004c0)) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000160000000a20000000000a01010000000000000000020000000900010073797a300000000038000000030a01946de0cffb1c1b4ad6d0020000000000000000020000000900010073797a30000000000900030073797a32000000000900030073797a310000000014000000020a090000000000000000000200000614000000110001"], 0x94}}, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) clone(0x820103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$LOOP_CLR_FD(r4, 0x4c01) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0xc, 0xe, 0x4, 0x33, 0x0, 0x400, 0x900, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000240), 0xb}, 0x80, 0x357a, 0x6, 0x4, 0xfffffffffffffffa, 0x0, 0x7}, r1, 0xf, 0xffffffffffffffff, 0xb) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 17:50:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 17:50:51 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000140)={{0x1b, 0x29, 0x7, 0x7, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 17:50:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0x8400ae8e, 0x0) [ 251.041594][T13436] rtc_cmos 00:00: Alarms can be up to one day in the future 17:50:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:51 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x22, 0x0, 0x0) 17:50:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4188aea7, &(0x7f00000000c0)={{0x0, 0x0, 0x80}, "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", "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"}) 17:50:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b00)={&(0x7f0000000940)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000a00)=""/242, 0x1a, 0xf2, 0x1}, 0x20) 17:50:52 executing program 5: shmat(0x0, &(0x7f0000000000/0x800000)=nil, 0x4000) shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000000)=""/66) 17:50:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0x8400ae8e, 0x0) 17:50:52 executing program 0: socketpair(0x26, 0x5, 0xfffe0, &(0x7f0000000000)) 17:50:52 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x31, 0x0, 0x300) [ 251.336309][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 251.336581][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future 17:50:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x1c}) 17:50:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0x8400ae8e, 0x0) [ 251.336849][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 251.337161][ T9725] rtc_cmos 00:00: Alarms can be up to one day in the future [ 251.337182][ T9725] rtc rtc0: __rtc_set_alarm: err=-22 17:50:52 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x3a, 0x0, 0x300) 17:50:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4080aebf, &(0x7f0000000240)) 17:50:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:52 executing program 4: r0 = socket(0x1, 0x3, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000880)) 17:50:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0x8400ae8e, 0x0) 17:50:52 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x40084504, 0x0) 17:50:52 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea3, 0x0) 17:50:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2600}]}}, &(0x7f0000000700)=""/238, 0x26, 0xee, 0x1}, 0x20) 17:50:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4080aebf, &(0x7f0000000240)) 17:50:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0x8400ae8e, 0x0) 17:50:52 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, 0x0) 17:50:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc004ae0a, 0x544048) 17:50:52 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0x8400ae8e, 0x0) 17:50:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4080aebf, &(0x7f0000000240)) 17:50:53 executing program 5: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x5411, &(0x7f0000000000)) 17:50:53 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x4, 0x0, 0x300) 17:50:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x8188aea6, &(0x7f0000000240)) 17:50:53 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0x8400ae8e, 0x0) 17:50:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x13, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], r1}, 0x40) 17:50:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x28011, r0, 0x0) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x2, [@fwd, @const, @enum={0x0, 0x4, 0x0, 0x6, 0x4, [{}, {}, {}, {}]}, @func, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}, @datasec={0x0, 0x9, 0x0, 0xf, 0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}], 'Y'}, @array]}}, 0x0, 0x13a}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 17:50:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4080aebf, &(0x7f0000000240)) 17:50:53 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0x8400ae8e, 0x0) 17:50:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func_proto={0x2}]}, {0x0, [0x0]}}, &(0x7f0000000700)=""/238, 0x27, 0xee, 0x1}, 0x20) 17:50:53 executing program 4: r0 = socket(0x1, 0x3, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x89e0, 0x0) 17:50:53 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040)=0x1, 0x4) [ 252.812516][T13598] ptrace attach of "/root/syz-executor.1"[13586] was attempted by "/root/syz-executor.1"[13598] 17:50:53 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0x8400ae8e, 0x0) 17:50:53 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x29, 0x17, 0x0, 0x0) 17:50:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:53 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$KVM_CREATE_VM(r0, 0x5452, 0x544048) 17:50:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)) 17:50:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0x4068aea3, 0x4fe000) 17:50:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) 17:50:53 executing program 4: r0 = socket(0xa, 0x2, 0x0) connect$vsock_stream(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @local}, 0x10) 17:50:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) 17:50:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/nf_conntrack_expect\x00') syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000040)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 17:50:53 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, &(0x7f0000000240)) 17:50:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="b86a008ec0ea0000b2000f20c06635040000000f22c036660f388240003e64640f2067f30f95df0f2098650f001466b80d0000000f23d00f21f86635000000010f23f80f20c06635000000200f22c0", 0x4f}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r2, 0xae80, 0x0) 17:50:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, 0x0) 17:50:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4080aebf, &(0x7f0000000240)) 17:50:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0x8400ae8e, 0x0) [ 253.528648][T13663] general protection fault, probably for non-canonical address 0xdffffc0000001828: 0000 [#1] PREEMPT SMP KASAN [ 253.540428][T13663] KASAN: probably user-memory-access in range [0x000000000000c140-0x000000000000c147] [ 253.549976][T13663] CPU: 0 PID: 13663 Comm: syz-executor.1 Not tainted 5.12.0-rc2-syzkaller #0 [ 253.558749][T13663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.568807][T13663] RIP: 0010:vmx_vcpu_run+0x8b5/0x2bb0 17:50:54 executing program 4: r0 = socket(0xa, 0x3, 0x5) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x3a, 0x14, 0x0, 0x300) 17:50:54 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0x8400ae8e, 0x0) [ 253.574305][T13663] Code: 55 00 44 39 eb 0f 8d 8d 00 00 00 e8 75 9e 55 00 48 8b 0c 24 48 63 c3 48 8d 04 40 4c 8d 2c c1 49 8d 7d 08 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 4e 1e 00 00 49 8d 7d 10 4d 8b 75 08 48 89 f8 [ 253.593915][T13663] RSP: 0018:ffffc90008a87b18 EFLAGS: 00010006 [ 253.599994][T13663] RAX: 0000000000001828 RBX: 0000000000000000 RCX: 000000000000c138 [ 253.607976][T13663] RDX: 0000000000040000 RSI: ffffffff811e127b RDI: 000000000000c140 [ 253.615955][T13663] RBP: ffff888026b227c0 R08: 0000000000000000 R09: 0000000000000000 [ 253.623934][T13663] R10: ffffffff811e1236 R11: 0000000000000000 R12: dffffc0000000000 [ 253.631914][T13663] R13: 000000000000c138 R14: 00000000001526f0 R15: ffff888026b227f0 [ 253.639894][T13663] FS: 00007f9b1a018700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 253.648838][T13663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.655540][T13663] CR2: 0000000000510f90 CR3: 0000000014014000 CR4: 00000000001526f0 [ 253.663611][T13663] Call Trace: [ 253.666910][T13663] ? clear_atomic_switch_msr+0xad0/0xad0 [ 253.672564][T13663] vcpu_enter_guest+0x1d95/0x47f0 [ 253.677707][T13663] ? kvm_vcpu_reload_apic_access_page+0x70/0x70 [ 253.683968][T13663] ? lock_release+0x720/0x720 [ 253.688714][T13663] ? mark_held_locks+0x9f/0xe0 [ 253.693496][T13663] ? kvm_arch_vcpu_ioctl_run+0x47d/0x19b0 [ 253.699228][T13663] kvm_arch_vcpu_ioctl_run+0x47d/0x19b0 [ 253.704791][T13663] kvm_vcpu_ioctl+0x467/0xd90 [ 253.709562][T13663] ? kvm_io_bus_write+0x280/0x280 [ 253.714602][T13663] ? generic_block_fiemap+0x60/0x60 [ 253.719865][T13663] ? lock_downgrade+0x6e0/0x6e0 [ 253.724732][T13663] ? __fget_files+0x288/0x3d0 [ 253.729422][T13663] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 253.735751][T13663] ? kvm_io_bus_write+0x280/0x280 [ 253.740790][T13663] __x64_sys_ioctl+0x193/0x200 [ 253.745566][T13663] do_syscall_64+0x2d/0x70 [ 253.750056][T13663] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 253.756021][T13663] RIP: 0033:0x465f69 [ 253.759922][T13663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 253.779542][T13663] RSP: 002b:00007f9b1a018188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.787967][T13663] RAX: ffffffffffffffda RBX: 000000000056c008 RCX: 0000000000465f69 [ 253.795947][T13663] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 253.803923][T13663] RBP: 00000000004bfa8f R08: 0000000000000000 R09: 0000000000000000 [ 253.811900][T13663] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c008 [ 253.819878][T13663] R13: 0000000000a9fb1f R14: 00007f9b1a018300 R15: 0000000000022000 [ 253.827948][T13663] Modules linked in: [ 253.831853][T13663] ---[ end trace e4c8b7446431c0f5 ]--- [ 253.837306][T13663] RIP: 0010:vmx_vcpu_run+0x8b5/0x2bb0 [ 253.842692][T13663] Code: 55 00 44 39 eb 0f 8d 8d 00 00 00 e8 75 9e 55 00 48 8b 0c 24 48 63 c3 48 8d 04 40 4c 8d 2c c1 49 8d 7d 08 48 89 f8 48 c1 e8 03 <42> 80 3c 20 00 0f 85 4e 1e 00 00 49 8d 7d 10 4d 8b 75 08 48 89 f8 [ 253.862311][T13663] RSP: 0018:ffffc90008a87b18 EFLAGS: 00010006 [ 253.868388][T13663] RAX: 0000000000001828 RBX: 0000000000000000 RCX: 000000000000c138 [ 253.876399][T13663] RDX: 0000000000040000 RSI: ffffffff811e127b RDI: 000000000000c140 [ 253.884377][T13663] RBP: ffff888026b227c0 R08: 0000000000000000 R09: 0000000000000000 [ 253.892351][T13663] R10: ffffffff811e1236 R11: 0000000000000000 R12: dffffc0000000000 [ 253.900334][T13663] R13: 000000000000c138 R14: 00000000001526f0 R15: ffff888026b227f0 [ 253.908313][T13663] FS: 00007f9b1a018700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 253.917250][T13663] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 253.923845][T13663] CR2: 0000000000510f90 CR3: 0000000014014000 CR4: 00000000001526f0 [ 253.931829][T13663] Kernel panic - not syncing: Fatal exception [ 253.938674][T13663] Kernel Offset: disabled [ 253.943114][T13663] Rebooting in 86400 seconds..