00000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001640)=@base={0x19, 0x4, 0x8, 0xffff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 18:24:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000001c0)={'pimreg\x00'}) 18:24:27 executing program 3: mkdir(&(0x7f0000001480)='./file1\x00', 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)={&(0x7f0000000040)='./file1/file0\x00'}, 0x10) unlink(&(0x7f0000000080)='./file1\x00') 18:24:27 executing program 1: syz_clone(0x54508000, 0x0, 0x0, 0x0, 0x0, 0x0) 18:24:27 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, 0x0, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:27 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x2, &(0x7f0000000540)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0}], &(0x7f0000000440)='syzkaller\x00', 0x1, 0xd8, &(0x7f00000005c0)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0x12, 0x800, 0x0, 0x5}, 0x48) 18:24:28 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:28 executing program 3: socketpair(0x25, 0x0, 0x0, &(0x7f0000000e40)) 18:24:28 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000024c0)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') 18:24:28 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001380)=@bloom_filter, 0x48) 18:24:28 executing program 3: syz_clone(0x11001000, 0x0, 0x0, 0x0, 0x0, 0x0) 18:24:28 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000024c0)='ns/pid\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') 18:24:28 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/ipc\x00') 18:24:28 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:28 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:28 executing program 3: socketpair(0x26, 0x805, 0x7, &(0x7f0000000680)) 18:24:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x18, 0x5, &(0x7f00000007c0)=@framed={{}, [@ldst={0x1}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000800)='syzkaller\x00', 0x7, 0xfb, &(0x7f0000000840)=""/251, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:29 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:29 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001280)=@base={0x1, 0x7f, 0x7ff, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 18:24:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x4}, 0x48) 18:24:29 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:29 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:29 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@base={0x12, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x48) 18:24:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'veth1_to_bridge\x00', 0x4000}) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 18:24:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x0, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000080)) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x23000) 18:24:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x10}, 0x10) recvmsg(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=""/4096, 0x1000}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001500)={[{0x0, 'blkio'}, {0x0, 'devices'}, {0x2b, 'perf_event'}, {0x2b, 'rdma'}]}, 0x22) bpf$ITER_CREATE(0x21, 0x0, 0x0) mkdir(&(0x7f0000001700)='./file0\x00', 0x180) bpf$ITER_CREATE(0x21, &(0x7f0000001940), 0x8) 18:24:29 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:30 executing program 1: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000a40)) 18:24:31 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:31 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000940)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a40)) 18:24:31 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x0, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000080)) gettid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x23000) 18:24:31 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8943, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'veth1_to_bridge\x00', 0x4000}) r3 = gettid() perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 18:24:31 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:31 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:31 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) 18:24:31 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) 18:24:31 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:31 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) [ 777.819184][T26958] EXT4-fs warning (device sda1): verify_group_input:150: Cannot add at group 0 (only 8 groups) 18:24:31 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) 18:24:31 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:31 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:32 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) 18:24:32 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x0, 0x0, 0x6}, 0x48) 18:24:32 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:32 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x3}]}]}}, &(0x7f0000000100)=""/208, 0x2e, 0xd0, 0x1}, 0x20) 18:24:32 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) 18:24:32 executing program 3: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) 18:24:32 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x1, &(0x7f0000000140)=@raw=[@generic], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/208, 0x3b, 0xd0, 0x1}, 0x20) 18:24:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40286608, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:24:33 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000005bc0), 0x6de8484cc3430185, 0x0) 18:24:33 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x5, 0x10, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000180), 0x8}, 0x8, 0x805, 0x0, 0x0, 0x0, 0xffff52ac, 0x1, 0x0, 0x20, 0x0, 0x400}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000540)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x22, 0x0, 0xa8d3, 0x48200, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x49901, 0xffffffff, 0x101, 0x4, 0x0, 0xffffffff, 0x7, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x1, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.net/syz0\x00', 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x0, 0x4, 0x4}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000200)="fdce2dd515d547bcee67", 0x801, r3}, 0x38) write$cgroup_subtree(r0, &(0x7f0000000140)=ANY=[@ANYRES8=r3], 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='memory.events\x00') write$cgroup_int(r2, &(0x7f0000000200), 0x40600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) syz_clone(0x0, &(0x7f00000006c0), 0x0, &(0x7f00000005c0), 0x0, &(0x7f0000000640)) [ 779.519135][T27005] EXT4-fs warning (device sda1): verify_group_input:150: Cannot add at group 0 (only 8 groups) 18:24:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:34 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) 18:24:34 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:34 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x5, 0x0, 0x5}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:34 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000002c0)='ns/user\x00') 18:24:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x7, 0x0, 0x9, 0x0, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x13, 0x8, 0x5f9, 0x0, 0x40, 0x1}, 0x48) 18:24:34 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:34 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x8, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xc, 0x0, 0x4, 0x0, 0xccc7971d4acd67b1, 0x1}, 0x48) 18:24:35 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x3}]}}, &(0x7f0000000100)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 18:24:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001a40)={0x11, 0x4, &(0x7f00000003c0)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x5, 0xab, &(0x7f0000001980)=""/171, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:35 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000140)='GPL\x00', 0x1, 0x1000, &(0x7f0000000fc0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 18:24:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:35 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x0, 0x8}, 0x48) 18:24:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x0, 0x2}, {}]}]}}, &(0x7f0000000180)=""/227, 0x36, 0xe3, 0x1}, 0x20) 18:24:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, &(0x7f00000003c0)=""/180, 0x0, 0xb4, 0x8}, 0x20) 18:24:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x11, 0x2, &(0x7f0000000000)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1d, 0x0, 0x0, 0x7, 0x1, 0x1}, 0x48) 18:24:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:36 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000001c0)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000200)=@bpf_lsm={0x1c, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0}, 0x80) 18:24:36 executing program 4: socketpair(0x2, 0x5, 0x2001, &(0x7f0000000040)) 18:24:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000900)="1a", 0x1}], 0x1}, 0x0) 18:24:36 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:36 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) close(r1) sendmsg$inet(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) 18:24:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002880)=ANY=[@ANYBLOB="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"/4320], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='sys_enter\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) recvmsg$unix(r1, 0x0, 0x0) 18:24:36 executing program 4: syz_clone(0x710cf100, 0x0, 0x0, 0x0, 0x0, 0x0) 18:24:36 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:36 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) close(r0) 18:24:36 executing program 1: socketpair(0x28, 0x1, 0x0, &(0x7f0000000700)) 18:24:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)='r', 0x1}], 0x1, 0x0, 0x30}, 0x800) 18:24:37 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000400)="ea", 0x1}], 0x1}, 0x0) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}, {&(0x7f0000000300)=""/196, 0xc4}], 0x2, 0x0, 0xe8}, 0x0) 18:24:37 executing program 4: socketpair(0x2, 0x5, 0x6, &(0x7f0000000040)) 18:24:37 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0xa0}, 0x700) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000007c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 18:24:37 executing program 3: socketpair(0xa, 0x0, 0x2e1, &(0x7f0000000700)) 18:24:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x304}, 0x48) 18:24:37 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_to_bond\x00', 0x20}) 18:24:37 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:37 executing program 1: syz_clone(0x101f1000, 0x0, 0x0, 0x0, 0x0, 0x0) 18:24:39 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:39 executing program 4: syz_clone(0x10000100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="f6cc8311") 18:24:39 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x894c, 0x0) 18:24:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5, 0x0, 0x0, 0x0, 0x201}, 0x48) 18:24:39 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:39 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:39 executing program 3: syz_clone(0x40040400, 0x0, 0x0, 0x0, 0x0, 0x0) 18:24:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x5}, 0x48) 18:24:39 executing program 4: syz_clone(0x10000100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="f6cc8311") 18:24:39 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000680)={'veth0_macvtap\x00'}) 18:24:39 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:39 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000004e40)='ns/time_for_children\x00') 18:24:40 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000300)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:40 executing program 4: syz_clone(0x10000100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="f6cc8311") 18:24:40 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0xffffffffffffff8d, &(0x7f0000000140)="b9ff0300600d698cff781af008004de7f9c764362ae28e0207001b00000703a08b7983080594e5d04e0d070310071263afc0d0c30000000000000000000000040000", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 18:24:40 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) 18:24:40 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:40 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:40 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000001400)={0x0, 0x80040200, &(0x7f00000025c0)=[{&(0x7f00000000c0)="b8", 0x7ffff008}], 0x4, 0x0, 0x0, 0x40020a00}, 0x6d70) 18:24:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(r0, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0xa, 0x6, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x4800}, 0x0) 18:24:40 executing program 4: syz_clone(0x10000100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="f6cc8311") 18:24:40 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x0, 0x0, 0x74000000}}, &(0x7f0000000080)='GPL\x00', 0x1, 0xa2, &(0x7f00000000c0)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:40 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000b05d2", 0x9}], 0x1}, 0x0) 18:24:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:41 executing program 1: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) recvmsg(r0, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, 0x0) 18:24:41 executing program 4: r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x64f4b5f1d18c9b7a, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022000b05d25a80648c6394f90224fc6058650b400a000000053582c137153e370248018000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 18:24:41 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:41 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0x20000841) 18:24:41 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:41 executing program 3: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) recvmsg(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x60) 18:24:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x5}) ioctl$TUNSETPERSIST(r0, 0x400454c9, 0x0) 18:24:42 executing program 3: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000003800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002380)=[{0x10, 0x84, 0x5}], 0x10}, 0x0) 18:24:42 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:42 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={&(0x7f0000000140)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x200408c4) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000b00)="c5", 0x1}], 0x1}, 0x4008000) 18:24:42 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8) r0 = gettid() perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x6, 0x1, 0xff, 0x40, 0x0, 0x0, 0x20440, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, @perf_config_ext={0x0, 0x10001}, 0x100, 0xfffffffffffff7fd, 0x5, 0x2, 0x2, 0x1000, 0x5, 0x0, 0x1, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a00)=ANY=[@ANYBLOB="61128c000000000061138c0000000000bf3000000000000007030000050805002d03010000000000950000b0000000006916000000000000bc6700000000000035060000c0ff3f006706000002000000070300000ee60060bf050000000000000f650000000000006507f9ff01000000070200004c000000cc75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000b21e4b8e4721250032ed3c5be95e5db67754bb12feffffffc8cf264e0f84f9f17d3c30e3c7bdd2f26db1da54558f2278af6d71d79a5e12814cb1d8a5d460c4f6f3be4b366d0a3e1282ee45a010fb94fe9de56c9da99bd5add881806ef08513e3d3778a814261bdb94a050000002178175f0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefaedf10271a51445dc8da39e5b0ab737a1b901627b562ed04ae76002d4519af619e3a2a4d69e0dee5eb106774a8f3e69167a4ae6f5e8a15793243bf6afa5dfec5fd3c57b57b9a19feafb735fd552bdc206004aeb0743eb2d3d46c14ee557363c91a6bb55d8c85f21dce413e56723888fb126a163f16fb2ad9bc1172ba7cbebe174aba210d763222d03cecac4d03723f1c932b3a6aa57f83004053d5897f1ad2e99e0e67a993716dbf580469f0f53acbb40b401e3780870b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562671cd47840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884dc00031e03a651bb96589a7eab048706c47287cd313f59a50f00567b40407d000000000000000000070000005f37d83f84e98a525280bdf90d703f3767ce603c9d48e1ff5aca01000000e899a53f6715a0a62a34b0c97d6863194866dd63028acfc1d926a0f6a5480a55c22fe394ac0000000000000000d6ffda1fe60738b5c1f85ddd66fa8ddcf29338f900ecdd5f4cb82eebc4961f0c9d96d82ffe0c2f36b38f98fbbd5621ea9000a1a5bd90f6c424bf735be45e162b37700d77393de66a627a8982dfd7cb930e1299df4ac29b02250347e5001b1066e877f429f4b7b69fd24a4026ee4b48da935e846449cb72a2f869cd39a9615931781aaa0013e41ba914758d1ff658305f45333aa389494b832489bc5aed4da4d44644586b3eb9b1e3d8c4b412e705f8a7d4abf6217ae6b8dadc67116012e241609042f3aeccf42754d5d5a6e1ccaf6a1f7ac3e97cab4535d963ac7ee1c968d1fdab8c245c86657f931ad8b2e687e7b625387486484d58498da5527fe49654e7179c3aecbde2f33f22a655759d5f031c144b5c89b982c4676b6e678d3e317dc3e2a5ace847922c3ff4b53e72a939eb60e7fc9a98665f702da457a87c5ed13b27f87948c40ce49fb654d5728e6aabe410abe800ede5669bfb9b77269bcd6874e7abf80defda52ab17d79e175ea36be8c1281395f87c945ae8eb54866ec6e9c1336204500bc769b297eabb34d07fd0dba4125f0f341d28e4b0541f13c888d68d219cfbb1598dcef0afe5ff513e224c732cd5288b81e40499d5dd50da8c3062e7b8eb42d5bfd035635648523a10f88ae76dc26c264e3824a13b1701cc6da9fad45e32317636004d92961b6ca1486d24b8d23bb5dd1fd8cb62cf45ddb17f00bfac72f27b60fb91a70234ce36fee01f7b5ecc0763e52b0b259726756d13a39cac8c36b110ee2d10cd2f32213502fba38c9f5fd3b7255dd972cacc1516d819acbd36ba5ba746ad2ab67e902e6b7fb167c283b53619c3000000000000000000000000004d61f86239e7462d96c3a8cfb8fae2c10e9322d7624e726894bcda8d064cf2fce50bc9fe4ec654a6b61a129f04a1022dee8b6df407dae8dba4b32bd7cae5bb0fcf2cfd460fdd3ec2dd49ff35b8c1fb2e3e339d59f0ee1cd8"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840), 0x8, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 18:24:43 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x0, 0xffffffff, 0x0, 0x8, 0x1, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) syz_clone(0x710c9200, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) gettid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0xff, 0x12) write$cgroup_int(r2, &(0x7f0000000100)=0x100000000000000, 0x12) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x8, 0x0, 0x7, 0x80000100, 0x5, 0x0, 0x0, 0x7, 0x0, 0x400000008}, 0x0, 0x0, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, 0x0, 0x32600) 18:24:43 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int]}}, &(0x7f0000000d00)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x20, &(0x7f0000000140)={&(0x7f0000000000)=""/69, 0x45, 0x0, 0x0}}, 0x10) 18:24:43 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:43 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x5452, &(0x7f0000000300)='/?\t\x8e\xa7\xe7t\x82\xf9\xebI\x15\xda\xc9\xe6\xe5\xf7\"\xf2\x91)\xf4i\x8e\xc0\x92\x94oR\xd8\xea\x8b\xdd\xd5&\xffV\xeb\xc5\xb80\x99\xd5\'\xf2\b\xc4J\xd0\xeey\x14\x81\xeb\x84\x18v\xc0\xf2\xec\xa2\xc9\xf9\bJ\xcdY\xd8\xaa\xa7\xa0\x8fAq\x97;]\xfbT\xb6\xdc^?\x14\xf5\xcf4%\xc6\x0f+\x83\xdd\x1c\x89e\x11\x1c\x03\x83\x17\xf6\xfe\xad8\xa0\xe4\x9d#\xb6\xaa\x9f\x82I,\x90\x81\xbbz\x94J\x8f&\x8f\xe5^\xee\xfc\xffX\xce\xb6\xbb{\xcf\x81b\x05@\xb3\x89P\xb3\xc9\t\xe59y^E\by\x00\x00\x00\x00') 18:24:43 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8) r0 = gettid() perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x6, 0x1, 0xff, 0x40, 0x0, 0x0, 0x20440, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, @perf_config_ext={0x0, 0x10001}, 0x100, 0xfffffffffffff7fd, 0x5, 0x2, 0x2, 0x1000, 0x5, 0x0, 0x1, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840), 0x8, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 18:24:43 executing program 1: openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x303, 0x303, &(0x7f0000000040)="b90703600000f007049e0ff0888e35ffffe10e00a814633a77fbac141441e0002001be3e7d2a182fff", 0x0, 0x3d, 0x18000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000, 0x0, 0x0, &(0x7f0000000640), &(0x7f0000000100)}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 18:24:43 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x0, 0xffffffff, 0x0, 0x8, 0x1, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) syz_clone(0x710c9200, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) gettid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0xff, 0x12) write$cgroup_int(r2, &(0x7f0000000100)=0x100000000000000, 0x12) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x8, 0x0, 0x7, 0x80000100, 0x5, 0x0, 0x0, 0x7, 0x0, 0x400000008}, 0x0, 0x0, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, 0x0, 0x32600) 18:24:43 executing program 1: r0 = perf_event_open(&(0x7f0000000d00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000540)={0x0, 0x400300, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e8000000000000000b01b40838e400008e548fe282fccec7bf495d5c618332756cbb1bb9ce6d12b9d976d1f33aca41e50a3342bcd67c311f7885a05c32cf01001ffc97ec481e7ca2c3ca4c7b3bf93848f62e111e5a79a679110028977ba6ae76ece37bdaae6da997fbc15f89c6ce8bef0c7b760667b51fb8610fc3be5ef41f953fedb32aceeada13250626af7e2013d5b12cc916541ccbeb20a162b1832e103daba20400ede0c9e3dc299446d9284ebe0e46eee7bc145ff0a2779c0255000000000000006b8c60f254f23344a80a0aac7b141787bad604000000000000003158f0d200000000000070000000000000000701000040000000afffffc2946e41ef3167d1f6ed47aa1f52bad114a89dbed741f74b23cd8d915e2dcc36a3e3f63a439887a9d3956d5cadb642ac79fcb0aae3654482188263abd27e9d57cc28032453dc03000000ffffab38b7e7719805a455e79802d07ec60c00b0000000000000000100000001"], 0x208}, 0x1100000000000000) recvmsg(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=""/4096, 0x1000}, 0x2) perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x8, 0x5, 0x10, 0x7f, 0x0, 0x3ff, 0x42500, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x40}, 0x2c0, 0x7fffffffffffffff, 0x4, 0x6, 0x6, 0x3, 0xd8, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r0, 0x0) recvmsg(r2, &(0x7f0000000840)={&(0x7f00000006c0)=@isdn, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000740)=""/91, 0x5b}], 0x1}, 0x22) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='devices.list\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = gettid() perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x6, 0x4, 0x9, 0x5, 0x0, 0x4, 0x2, 0x8, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x20800, 0x7, 0xc7, 0x2, 0x3, 0x7, 0x800, 0x0, 0x1f, 0x0, 0x8}, r5, 0xffffffffffffffff, r4, 0x2) perf_event_open(&(0x7f0000000880)={0x2, 0x80, 0x40, 0x43, 0x40, 0x5, 0x0, 0x3, 0x1002, 0xd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x18208, 0x4, 0x9, 0x5, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1000}, r5, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x5, 0x9, 0x80, 0x0, 0x0, 0x25f, 0x40000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000000), 0x8}, 0x40000, 0x2, 0x8, 0x2, 0x9, 0x9, 0xe5e, 0x0, 0x9, 0x0, 0x40}, 0x0, 0x0, r3, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x1) 18:24:43 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:44 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x0, 0xffffffff, 0x0, 0x8, 0x1, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) syz_clone(0x710c9200, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) gettid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0xff, 0x12) write$cgroup_int(r2, &(0x7f0000000100)=0x100000000000000, 0x12) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x8, 0x0, 0x7, 0x80000100, 0x5, 0x0, 0x0, 0x7, 0x0, 0x400000008}, 0x0, 0x0, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, 0x0, 0x32600) 18:24:44 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:45 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x65, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:45 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8) r0 = gettid() perf_event_open(&(0x7f0000000500)={0x0, 0x80, 0x6, 0x1, 0xff, 0x40, 0x0, 0x0, 0x20440, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x5, @perf_config_ext={0x0, 0x10001}, 0x100, 0xfffffffffffff7fd, 0x5, 0x2, 0x2, 0x1000, 0x5, 0x0, 0x1, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0xf) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000a00)=ANY=[@ANYBLOB="61128c000000000061138c0000000000bf3000000000000007030000050805002d03010000000000950000b0000000006916000000000000bc6700000000000035060000c0ff3f006706000002000000070300000ee60060bf050000000000000f650000000000006507f9ff01000000070200004c000000cc75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000b21e4b8e4721250032ed3c5be95e5db67754bb12feffffffc8cf264e0f84f9f17d3c30e3c7bdd2f26db1da54558f2278af6d71d79a5e12814cb1d8a5d460c4f6f3be4b366d0a3e1282ee45a010fb94fe9de56c9da99bd5add881806ef08513e3d3778a814261bdb94a050000002178175f0d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5af65727546e7c955ccefaedf10271a51445dc8da39e5b0ab737a1b901627b562ed04ae76002d4519af619e3a2a4d69e0dee5eb106774a8f3e69167a4ae6f5e8a15793243bf6afa5dfec5fd3c57b57b9a19feafb735fd552bdc206004aeb0743eb2d3d46c14ee557363c91a6bb55d8c85f21dce413e56723888fb126a163f16fb2ad9bc1172ba7cbebe174aba210d763222d03cecac4d03723f1c932b3a6aa57f83004053d5897f1ad2e99e0e67a993716dbf580469f0f53acbb40b401e3780870b315d362ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000000000bc00f674629709e7e78f4ddc211bc3ebf0bd9d42ca019dd5d022cf74686e9fbe2562671cd47840a7afaab43176e65ec1118d46d1e827f3472f4445d253887a5ad103649afa17690884dc00031e03a651bb96589a7eab048706c47287cd313f59a50f00567b40407d000000000000000000070000005f37d83f84e98a525280bdf90d703f3767ce603c9d48e1ff5aca01000000e899a53f6715a0a62a34b0c97d6863194866dd63028acfc1d926a0f6a5480a55c22fe394ac0000000000000000d6ffda1fe60738b5c1f85ddd66fa8ddcf29338f900ecdd5f4cb82eebc4961f0c9d96d82ffe0c2f36b38f98fbbd5621ea9000a1a5bd90f6c424bf735be45e162b37700d77393de66a627a8982dfd7cb930e1299df4ac29b02250347e5001b1066e877f429f4b7b69fd24a4026ee4b48da935e846449cb72a2f869cd39a9615931781aaa0013e41ba914758d1ff658305f45333aa389494b832489bc5aed4da4d44644586b3eb9b1e3d8c4b412e705f8a7d4abf6217ae6b8dadc67116012e241609042f3aeccf42754d5d5a6e1ccaf6a1f7ac3e97cab4535d963ac7ee1c968d1fdab8c245c86657f931ad8b2e687e7b625387486484d58498da5527fe49654e7179c3aecbde2f33f22a655759d5f031c144b5c89b982c4676b6e678d3e317dc3e2a5ace847922c3ff4b53e72a939eb60e7fc9a98665f702da457a87c5ed13b27f87948c40ce49fb654d5728e6aabe410abe800ede5669bfb9b77269bcd6874e7abf80defda52ab17d79e175ea36be8c1281395f87c945ae8eb54866ec6e9c1336204500bc769b297eabb34d07fd0dba4125f0f341d28e4b0541f13c888d68d219cfbb1598dcef0afe5ff513e224c732cd5288b81e40499d5dd50da8c3062e7b8eb42d5bfd035635648523a10f88ae76dc26c264e3824a13b1701cc6da9fad45e32317636004d92961b6ca1486d24b8d23bb5dd1fd8cb62cf45ddb17f00bfac72f27b60fb91a70234ce36fee01f7b5ecc0763e52b0b259726756d13a39cac8c36b110ee2d10cd2f32213502fba38c9f5fd3b7255dd972cacc1516d819acbd36ba5ba746ad2ab67e902e6b7fb167c283b53619c3000000000000000000000000004d61f86239e7462d96c3a8cfb8fae2c10e9322d7624e726894bcda8d064cf2fce50bc9fe4ec654a6b61a129f04a1022dee8b6df407dae8dba4b32bd7cae5bb0fcf2cfd460fdd3ec2dd49ff35b8c1fb2e3e339d59f0ee1cd8"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000840), 0x8, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) 18:24:45 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, 0x0) 18:24:45 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x19, 0x0, 0xffffffff, 0x0, 0x8, 0x1, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) syz_clone(0x710c9200, 0x0, 0xffffffffffffff80, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7a, 0x1, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) gettid() r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.sched_load_balance\x00', 0x2, 0x0) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000180), 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040)=0xff, 0x12) write$cgroup_int(r2, &(0x7f0000000100)=0x100000000000000, 0x12) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380), 0x12) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x7ffffffffffffffd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000000140), 0x8}, 0x0, 0x8, 0x0, 0x7, 0x80000100, 0x5, 0x0, 0x0, 0x7, 0x0, 0x400000008}, 0x0, 0x0, r0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r3, 0x0, 0x32600) 18:24:45 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x65, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:45 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x0, 0x0, 0xe}}, &(0x7f0000000340)='syzkaller\x00', 0x4, 0xd3, &(0x7f0000000100)=""/211, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:45 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x0, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:45 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x1b, 0x0, 0x0, 0x2, 0x280, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000380)={&(0x7f0000000200)=""/251, 0xfb, 0x0, &(0x7f0000000300)=""/96, 0x60}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x5, 0x5, 0x9, 0x3ff, 0x0, r3, 0x0, '\x00', 0x0, r3, 0x2, 0x4}, 0x48) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000034c0)={&(0x7f0000003480)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003500)=@bpf_tracing={0x1a, 0xa, &(0x7f0000003300)=@raw=[@btf_id={0x18, 0x4}, @generic={0x6, 0x7, 0xa, 0x3ed9, 0x2}, @map_idx_val={0x18, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000}], &(0x7f0000003380)='GPL\x00', 0x0, 0x7, &(0x7f00000033c0)=""/7, 0x41100, 0xc, '\x00', 0x0, 0x18, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x124bf, r4}, 0x80) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x5, 0x5, 0x9, 0x3ff, 0x0, r6, 0x0, '\x00', 0x0, r6, 0x2, 0x4}, 0x48) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000034c0)={&(0x7f0000003480)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003500)=@bpf_tracing={0x1a, 0xa, &(0x7f0000003300)=@raw=[@btf_id={0x18, 0x4}, @generic={0x6, 0x7, 0xa, 0x3ed9, 0x2}, @map_idx_val={0x18, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000}], &(0x7f0000003380)='GPL\x00', 0x0, 0x7, &(0x7f00000033c0)=""/7, 0x41100, 0xc, '\x00', 0x0, 0x18, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x124bf, r7}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1a8}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x61}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffff800, 0x0, 0x0, 0x0, 0x6}, @alu={0x7, 0x0, 0x7, 0x3, 0x3, 0x20}]}, &(0x7f0000000100)='GPL\x00', 0x6, 0x26, &(0x7f0000000140)=""/38, 0x41000, 0x1, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x0, 0x7f}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, r0, r5, r0, r6]}, 0x80) 18:24:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x65, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:46 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x0, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:46 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x0, 0xf4240, &(0x7f0000002300)=@framed, &(0x7f0000002380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:46 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x0, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:46 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, 0x0) 18:24:46 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x1b, 0x0, 0x0, 0x2, 0x280, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x20, &(0x7f0000000380)={&(0x7f0000000200)=""/251, 0xfb, 0x0, &(0x7f0000000300)=""/96, 0x60}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x5, 0x5, 0x9, 0x3ff, 0x0, r3, 0x0, '\x00', 0x0, r3, 0x2, 0x4}, 0x48) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000034c0)={&(0x7f0000003480)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003500)=@bpf_tracing={0x1a, 0xa, &(0x7f0000003300)=@raw=[@btf_id={0x18, 0x4}, @generic={0x6, 0x7, 0xa, 0x3ed9, 0x2}, @map_idx_val={0x18, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000}], &(0x7f0000003380)='GPL\x00', 0x0, 0x7, &(0x7f00000033c0)=""/7, 0x41100, 0xc, '\x00', 0x0, 0x18, r3, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x124bf, r4}, 0x80) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x18}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001a00)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x5, 0x5, 0x9, 0x3ff, 0x0, r6, 0x0, '\x00', 0x0, r6, 0x2, 0x4}, 0x48) r7 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000034c0)={&(0x7f0000003480)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000003500)=@bpf_tracing={0x1a, 0xa, &(0x7f0000003300)=@raw=[@btf_id={0x18, 0x4}, @generic={0x6, 0x7, 0xa, 0x3ed9, 0x2}, @map_idx_val={0x18, 0xa}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x8000}], &(0x7f0000003380)='GPL\x00', 0x0, 0x7, &(0x7f00000033c0)=""/7, 0x41100, 0xc, '\x00', 0x0, 0x18, r6, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x124bf, r7}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x7, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1a8}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x61}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffff800, 0x0, 0x0, 0x0, 0x6}, @alu={0x7, 0x0, 0x7, 0x3, 0x3, 0x20}]}, &(0x7f0000000100)='GPL\x00', 0x6, 0x26, &(0x7f0000000140)=""/38, 0x41000, 0x1, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x0, 0x7f}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f0000000480)=[r3, r0, r5, r0, r6]}, 0x80) 18:24:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x84, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.events\x00', 0x100002, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6611, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0x8, 0x7f}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @generic={0x65, 0x0, 0x0, 0x0, 0x9cffffff}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000040)=""/182, 0x16a, 0xb6, 0x1}, 0x20) 18:24:46 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0x0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x4, 0x3, &(0x7f0000002300)=@framed, &(0x7f0000002380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:47 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000011c0)={&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 18:24:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0x0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:47 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x9, 0x3, &(0x7f0000002300)=@framed={{}, [], {0x95, 0x0, 0x1085}}, &(0x7f0000002380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000100)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:24:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000680)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x3}]}]}}, &(0x7f00000005c0)=""/164, 0x36, 0xa4, 0x1}, 0x20) 18:24:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb010018"], &(0x7f0000000140)=""/172, 0x107, 0xac, 0x1}, 0x20) 18:24:47 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) close(r0) close(r1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) write$cgroup_type(r1, &(0x7f0000000080), 0x11ffffce1) recvmsg(r0, &(0x7f0000000140)={0x0, 0x1d, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/110, 0x7ffff09a}], 0x1, 0x0, 0xf2, 0xa0}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5452, 0x0) 18:24:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0x0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:48 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000000)=@raw=[@map_fd={0x18, 0x0, 0x1, 0x0, 0x1}, @alu], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:48 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') recvmsg(0xffffffffffffffff, 0x0, 0x0) 18:24:48 executing program 4: bpf$OBJ_GET_MAP(0x15, &(0x7f0000000900)={&(0x7f0000000100)='./file0\x00'}, 0x10) 18:24:48 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x208, 0x1, &(0x7f0000000000)=@raw=[@ldst], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:48 executing program 1: socketpair(0xf, 0x3, 0x0, &(0x7f0000010200)) 18:24:48 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xb5) 18:24:48 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:48 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0x0, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, &(0x7f00000003c0)=""/159, 0x36, 0x9f, 0x1}, 0x20) 18:24:48 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0/file0\x00'}, 0x10) 18:24:48 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 18:24:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0x6, 0x45, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 18:24:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:49 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x9, 0x3, &(0x7f0000000440)=@framed={{0x18, 0xe}}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:49 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x9, 0xf, &(0x7f0000000140)=@framed={{}, [@alu, @map_idx_val, @generic, @call, @map_fd, @exit, @map_idx, @initr0]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 18:24:49 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x4, &(0x7f0000001d00)=@framed={{}, [@jmp]}, &(0x7f0000001d40)='syzkaller\x00', 0x5, 0xfc, &(0x7f0000001d80)=""/252, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x1, 0xd}]}, &(0x7f0000000280)='GPL\x00', 0x1, 0x1000, &(0x7f0000000640)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:49 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="93f522e690858e1e457a6dbaff7660490720cd089a5a63874e6902f68137fad542523c43abb8db94dd187826334143812b1e6636a7216976a64a82f611dd0abfb963d84a7a1a616d415e0c566612b514ae195c52b81583c7604be024370b03711442c4a44dabc207a59204778dca105d4525375c1328a73f5226a382e283eb716b353d0990d586246e32a33440f42df84ab547cc09aa7221ea93efddcc6d66c77c349a67f3b7f359c0dbd9af92cfb7e4dc29e4f69e135ddc4adee6", 0xbb}, {&(0x7f0000000140)="b8b1249cf379e606db4461facce1989b3de104dc4305b1718475fb485b20d1f1e486d2494cd22f82a62e4d4898c4619848d4983018be34027c3b997bd716e88afc0541ce731e9506abe641721135ba198ad8565f61f00791a1ddadeeec02b709e16b25f74e847b06e8aebb5dba2bb0b70a4b4d90d38d5b4cd874fcf11265375dbe1013f0526450019e33221704a7c7e97b07f17e5ebf0fa3b094780bfe", 0x9d}, {&(0x7f0000000200)="22a331cd57d93ef7e23b42ad5a1483c055c7", 0x12}, {&(0x7f0000000240)="91168758df2eec", 0x7}], 0x4, &(0x7f0000000380)=[{0x78, 0x0, 0x0, "ee459dc2f50ee6c5fe8f685c29c4fed6f133a17f31a444a3db4b7d95971a19498b49f11c35f7a712e384a43fc1e700c4cc31b11c4c30e5014d0b03ba953be2d5135fe31fbbeb83ae4c59e6924f3ef7d766ff11f9e0a0cc149cb37b7b87ccb8c868"}, {0x70, 0x0, 0x0, "02c894a48ef01077e7feb88c9afba1741bf23b0c1a9c3973afea006147646ae3c75ed0aa964ed4cd413e3e9233125b4945d433b7ad6ed7f27b29e4f7d17060abe96d89d40f07f9a70cece45bd62fca640abfd2d983cdf83866"}], 0xe8}, 0x0) 18:24:49 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0x0, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:49 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x5}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000001c0)) 18:24:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 18:24:49 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:49 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x5}) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000100)) 18:24:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@bloom_filter, 0x48) 18:24:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) 18:24:50 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'wg0\x00'}) 18:24:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x5}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000001c0)) 18:24:50 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0x0, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:50 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000001c0)=""/195, 0x29, 0xc3, 0x1}, 0x20) 18:24:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@base={0x0, 0x0, 0x0, 0x0, 0x1104, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 18:24:50 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000880)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000780), 0x0}, 0x48) 18:24:50 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x4020940d, &(0x7f00000000c0)) 18:24:50 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:50 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000180)=@framed={{0x5, 0x0, 0x2, 0x0, 0x0, 0x4}}, &(0x7f0000000080)='GPL\x00', 0x1, 0xa2, &(0x7f00000000c0)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:50 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2400, 0x0) 18:24:50 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) 18:24:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter, 0x48) 18:24:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001240)=[{&(0x7f00000000c0)="ff", 0x1}], 0x1, &(0x7f0000001280)=ANY=[@ANYBLOB='@'], 0x40}, 0x0) 18:24:51 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:51 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:51 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:51 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) 18:24:51 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000180)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 18:24:51 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001140)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@kfunc]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x1000, &(0x7f00000000c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000010c0), 0x8, 0x10, 0x0}, 0x80) 18:24:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, 0x0) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x170a) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x2d000) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 18:24:51 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x1102c, 0x3ff, 0x0, 0x6cd5182d4248170a, 0x0, 0x4}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 18:24:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x14}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) 18:24:51 executing program 3: syz_clone(0x4240000, 0x0, 0x0, 0x0, 0x0, 0x0) 18:24:51 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x9, 0x3, &(0x7f0000000180)=@framed={{0x5, 0x0, 0x0, 0x0, 0x2, 0x4}}, &(0x7f0000000080)='GPL\x00', 0x1, 0xa2, &(0x7f00000000c0)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:52 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:52 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x1102c, 0x3ff, 0x0, 0x6cd5182d4248170a, 0x0, 0x4}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 18:24:52 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:52 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x100200, &(0x7f0000000180)="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", 0xad0, &(0x7f00000000c0), 0x0, &(0x7f00000011c0)="bd0fd34bb6c13d90be8e1aa4937ed91f02b4ee820ed4750d141b97b1baf6bda3409b09da826d7e90c60db68398fc7ada16aec38295ab809b1552ecedc463d6969c70deb4e46d78980a3bf34520679deb4e42894054ef53816428f33f46026df8dbe1cefbc3") r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001280)={0x2, 0x80, 0x1, 0x5, 0x4, 0x0, 0x0, 0x1, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, 0x2, @perf_bp={0x0, 0x6}, 0x4240c, 0x5, 0x0, 0x5, 0x0, 0x8001, 0x5, 0x0, 0x2, 0x0, 0x4}, r2, 0x8, r3, 0x0) r4 = getpid() r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001400)={r4, r5, 0x0, 0x6, &(0x7f00000013c0)='+)]*\\\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0xb3, 0x4, 0xff, 0x0, 0x0, 0x840, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e719450511652e5, @perf_bp, 0x0, 0x5, 0x4, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x490}, r1, 0x0, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x430, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x4008, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001300)='memory.events\x00'}, 0x30) unlink(&(0x7f0000000140)='./cgroup\x00') 18:24:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) 18:24:52 executing program 3: syz_clone(0x8001000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="a8") 18:24:52 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:52 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x1102c, 0x3ff, 0x0, 0x6cd5182d4248170a, 0x0, 0x4}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 18:24:52 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x2}, 0x48) 18:24:53 executing program 3: perf_event_open(&(0x7f00000001c0)={0x7, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:24:53 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:53 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x100200, &(0x7f0000000180)="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", 0xad0, &(0x7f00000000c0), 0x0, &(0x7f00000011c0)="bd0fd34bb6c13d90be8e1aa4937ed91f02b4ee820ed4750d141b97b1baf6bda3409b09da826d7e90c60db68398fc7ada16aec38295ab809b1552ecedc463d6969c70deb4e46d78980a3bf34520679deb4e42894054ef53816428f33f46026df8dbe1cefbc3") r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001280)={0x2, 0x80, 0x1, 0x5, 0x4, 0x0, 0x0, 0x1, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, 0x2, @perf_bp={0x0, 0x6}, 0x4240c, 0x5, 0x0, 0x5, 0x0, 0x8001, 0x5, 0x0, 0x2, 0x0, 0x4}, r2, 0x8, r3, 0x0) r4 = getpid() r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001400)={r4, r5, 0x0, 0x6, &(0x7f00000013c0)='+)]*\\\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0xb3, 0x4, 0xff, 0x0, 0x0, 0x840, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e719450511652e5, @perf_bp, 0x0, 0x5, 0x4, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x490}, r1, 0x0, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x430, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x4008, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001300)='memory.events\x00'}, 0x30) unlink(&(0x7f0000000140)='./cgroup\x00') 18:24:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000003c0)="c79bad4a4d3e7d95c091114630894f5754b7a43d9182ab57cccb8d5a23c84904341af018fb8fa5afc035c734de2c7bcf556e7b4fc441b725f4cd055722d1e88d128e85b5778a3dd9601dfe4afafc51cf9793fb2423cf8dfe420f850bb6dc8e", 0x5f}, {&(0x7f0000000740)="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", 0xfa2}], 0x2}, 0x0) 18:24:53 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x1102c, 0x3ff, 0x0, 0x6cd5182d4248170a, 0x0, 0x4}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x80) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 18:24:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x800454cf, 0x0) 18:24:53 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x402, 0x0) 18:24:53 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x100200, &(0x7f0000000180)="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", 0xad0, &(0x7f00000000c0), 0x0, &(0x7f00000011c0)="bd0fd34bb6c13d90be8e1aa4937ed91f02b4ee820ed4750d141b97b1baf6bda3409b09da826d7e90c60db68398fc7ada16aec38295ab809b1552ecedc463d6969c70deb4e46d78980a3bf34520679deb4e42894054ef53816428f33f46026df8dbe1cefbc3") r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001280)={0x2, 0x80, 0x1, 0x5, 0x4, 0x0, 0x0, 0x1, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, 0x2, @perf_bp={0x0, 0x6}, 0x4240c, 0x5, 0x0, 0x5, 0x0, 0x8001, 0x5, 0x0, 0x2, 0x0, 0x4}, r2, 0x8, r3, 0x0) r4 = getpid() r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001400)={r4, r5, 0x0, 0x6, &(0x7f00000013c0)='+)]*\\\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0xb3, 0x4, 0xff, 0x0, 0x0, 0x840, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e719450511652e5, @perf_bp, 0x0, 0x5, 0x4, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x490}, r1, 0x0, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x430, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x4008, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001300)='memory.events\x00'}, 0x30) unlink(&(0x7f0000000140)='./cgroup\x00') 18:24:53 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:53 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 18:24:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x7f, 0x7f, 0x1, 0x9, 0x0, 0x8d79, 0x22000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x2, @perf_config_ext={0x0, 0x11e7}, 0x40082, 0xffffffffffffffff, 0x3f, 0x6, 0x8, 0x2, 0x9, 0x0, 0x9, 0x0, 0x10000}, 0x0, 0xc, r0, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) 18:24:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0xc020660b, 0x0) 18:24:54 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 18:24:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x5460, 0x0) 18:24:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000040)='GPL\x00', 0x3, 0xd3, &(0x7f0000000100)=""/211, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:54 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x0, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x4, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x0, 0x3f, 0x6, 0x81, 0x400, 0xffffffffffffffff, 0x10000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x5}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) mkdir(&(0x7f00000004c0)='./file0\x00', 0x148) 18:24:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x10}]}}, &(0x7f0000000400)=""/252, 0x26, 0xfc, 0x1}, 0x20) 18:24:54 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x100200, &(0x7f0000000180)="739f1a04207c4a88a2e9206560a0e1d46b918ed221be0f034f56661954c3c1ce0a1c98f5abc516fe4da85e5911a7d37c98fc0ef5fd254ea303f8184828344b22989a54071c3d4533354d4ef37a5c856d183481b30d201976aa9119b74eb7d182479b67e72bd2839d4099f62da34e9c532fc54cb831c521b31b14bc8667ad508a7cd64bda96c8ce1a3b9dcd50dfc417109351bf109a5c380db5c9d0ac01f7fdb649eafb4cbb8fbab2ac78f868c561a710f7d4cd6675b18abb28141abee5fb9da275e503382f0e7a331265a05067f9997c16e6d3fc53266723c3dcfdd0bf66fa305408cd3988e9d2136a8d5d114217f30843e589b9638bb9ada524dc1129372391ac8fa0f375718601fc39c09adbc7a1ade48af4d9ddcdffaae228a26d4d1f2e0d0f9c3bbbe851d452f64164fb5d4378aa729afe2c012b90a87b98938c381ff61b57045c48f5dd90c75f3b05315de837f3427e0a1c2d67dc79e7720a49852bb26545308fcd545b6d2c6e90cae53400ea4b57db3b8ca72247ca0ac472f30e8dce31aad0cbae2ae929f494a144236121d55af95429fb4a2de0107c83b70b90d6443a85b7b897f46e0d506de04c18860dc7f800c175601fd408bd12fa3d78a12c103b947e926b63c06b1674eb7454cee4c32884c312f52d108fe73d10679ef679130b497a5c925cfc92c9a7fa3017d135735f54675782553dc853b53eb10d9ed1051fe8c3887c6bfc933553dae3e9f522f0e8f598f4fbcc55c1102b5fbc443362eeb387890772b0cbebffbe617df76126e66ba46c6b7945a87178a7f2e103bc717736bacbd7f1005c4f3a76d39fbedb655d394e4b541878cf15dd8997356ebe5a1cab935d822b9878f07e6307d76aea67ff1df6d303b18b645fbc82d4a91fa9f5cef568f0d0e651bd219573691e839ae10a662eb8c5c9d4798d2cedade96c58ac436df44d5c45389061155ecb77316815435d6e076bc5b80ee5b8e287979acf578f0e9368a8a032a27149560827e1c63e7f4000e136c4308474862a3172dc011e6f3fffd09da8befb2bca840a6147630d8aa65d098af7ef9509479278a7320eceecbc4950b412110ff075ccaea7766e46e2fdf4b629fe2df6b8bc496d99c8e592c565cdf9d1230a4789d475ccaf233ecdde059a5b855b9917efaedcbb323d5d5b573b7472a5f36217bcdb060403231baf7abb1c43843b7cb90af45e52e4c8f5fef70ac9ef3fca89ffd111174a3110366008013587365ff89822d3a70575258a18750fb9318fec0360b655fee6d0076321a0418f661dd112e1669c2d06f656a291fc616b8b01baa66440ec67f2de475590a085ebfe6989ad140a49886814fd5c1a7a898efed4bf21253a5349ad6dcb9abaa3e7eacef450c37a6d7c0dc8fb356f956f2a10cb9061ad597908286e55d3fed678689428cbe7d69e0ca84d3b16f21da7470f5e15a17f66fce57727df912e3fd6c7ec7dbfb1d4e61acd026f0a2649a37f81777b87218dbe980d2da7bec167aca8bb4a28dfeffe34992fc6e5dd6aa69d51d92780f6eee1572be197a90cd20373d1bbaca3cbf4fa302b6b711ab712a2f421cf627ea4bff03810ef5dcf423cdaebe5e6eca3beea0c1f4b0ffd71d48f65732413908a3dfae62be397e03425fcd64c71841a7b25abd59475d95e47dfea8c78db585a0c67581d2e621bdc6fcdc4d1bb00cb4bacc0a3798abb42ca849c619ca2723b33e26d2a02019d936d5160d3ff645c38705d91af602480e2bc28f3cd16c169af0bd8bab5450ee410e0e62b4b961779fc9ee3d59464da3b8566b612dbad8041446cb5f06e037837b46a73c56d7f076105b616c9db598d4bb5c8febe796085cfe55a55265fe4775863230a97ebec8722bf8258b14b5112331e375f1a9bc3851be8ba1ac588adf95f63b3d14724cdb327f836300beddd766173740f513ee1d25f8d05fd58de050a20a03820c22e80e8d71ec319a7a3ece6f1cc39ca680a216db14bb3e574e2f454a92084c920f8cd33512aadeb109894fe1b92739c67625a32a3adf88c21180ded5150df624b02053bf396749d91a2d4d638577a2f5495bacfb30b953aeb8a2d785bcd5914b5ad97fcaa7371bb19cd229a24713a72c6855e17da6bf2a2ed7db3c1dad6e0a2f8fa303861ab3f72f58cc72775803ee7dc82ee2814da6729e4903bc91b27ed599459303d20c72f6b1f7a1c1882803dd388c2ca9982ea93b4eb89fc7fc89ffe766b8a141b29b7cf284977235ee4d570ec06cd5a82f74cd04ee812f9ab8b3c47a6b4ed999afd847de3e5ad5e4b0508b1efe8394275fb37574cd28a54da5cd89a53a07f7eb8994c0bc4ae2cc51fd7221042460bd200694e994a3a356285f31e74f78ccfb6ca28fb7493d472168d836f056134c6951f0d79aaa4daf2efc0dfb23b806f6bd52bed4f50c4801c483958c26b9775edf7260b5614195c81dae4c69626bc6b2e809fb6a0ae5324f8aa7988593e2da31b21bb103afeaeb6fff9063204a65f6f9dd2cf9cf4e7174dc212289a381dbf8d84730c90bbb7a6ca12bb2a4351f00babae3eeff45f8727cd5d1af60be5ab8aba30fba27854aa9d95227cb9abefd29da6872726d2f34724634cad7d6184c7f243814b7ecb34908ade8f85076fc4bb9c389de4d47e952fa6e34ded3431f2f25982626ddbde693a6e52e9269600707b765d6741a37ab14e21282b18a08f25d659cc01054d9df3a1322492a31d83fb2da82d3392f5bfeca64b968c4795a42b7d8e935054d2b2e2153a1c826c76f137414d86027abc1844aab592b768503353c18dbe513d35b9f34ca8a2862669da90e32dc6f6d6ce45ce6fbcbc4968ccb1ff618fc78d9b32eb6a852235194c539a0d235f26704f72e6bd260e464bfe1498a6a10dc2c9cf757d948108305baf63797a9b69c292c066a2045949499fe9f481bd8144a1667ef1fa899973b1fbd676c465fa6138522ca616ea10c36bb8bda02be6629923049f0192c49534a2170d88534227c0ec74b9ad290ba78516a5b6fa88adab981f26c5f8aee5bf14361e16085c1e4c86b2b2a08ea20ed559e86e02a8173d4304382701c48d0e6539aa25abe03f8e9b42e4e11c2e056d1ceba947f188f2f4e7347588b58941903a8e5d8f37d3d1ebd2327b2ceb525630c6fbe77bcd717ea2272987c87876f36f917c40e691c529cea6610c3d09d781c4b7fad567a6fe8cead3293898f6401cde19aaf21ece5cea25f6ee5f7e57c42d5ffe5a954ca7cfc39f6f5726bb905cec91620001350bddc7d426117898f5bdc4cd59012479950826e4121157bab9cbbdb71eb6ca2484af8aa87aed7321063491a9ddbe6b5b745fd003939d7d590e3ce11598c6c364bef0a5d146d236f5d43bf679dce3f7b440a7c17101b4455f804a69e1b17198d2d0fa4c78b857465d16ba57360c8c72511522ee08a907b6ae5519e24dab6a7c6528ae98e9daea8c604ed3b7d532c98658a20d650780dec4305fe86395f7fa7a2e4e604cae9120d1595d331f71361ddc4ac368c6c4445495e908cabc909e18e40e11cee1fa188491c86bf3284190b9a8598621ebff287362118aa7ca22f6db8d788529f9b993015cca8db62cc329af3639b4728768b38a3eb3510aa743991add01c3980704edf55aa077a8a19746f4b86a863f318961e562b6cdaeb01076fb874be26f990911d8072d88fe9a2c74daff32f035afeb37427a0f54f19f17cb13d8b7af0e6cf362b90ecdccf4fa0724de12c179579647de089c066b51d077820c3fa718b9225ddac44705c6224fc22afb1082c651b8cebd59bdc54f1043f1a9be8749c8d987e86ae159e3546c03f21016223a055394fb82feef2b61e1984d09d5e194e0f64f8cc86d527edd88f30a1b0ea03129d70df846b04797520c19de866c3bf2531f87134af6073577abd891ea", 0xad0, &(0x7f00000000c0), 0x0, &(0x7f00000011c0)="bd0fd34bb6c13d90be8e1aa4937ed91f02b4ee820ed4750d141b97b1baf6bda3409b09da826d7e90c60db68398fc7ada16aec38295ab809b1552ecedc463d6969c70deb4e46d78980a3bf34520679deb4e42894054ef53816428f33f46026df8dbe1cefbc3") r2 = gettid() r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000001280)={0x2, 0x80, 0x1, 0x5, 0x4, 0x0, 0x0, 0x1, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, 0x2, @perf_bp={0x0, 0x6}, 0x4240c, 0x5, 0x0, 0x5, 0x0, 0x8001, 0x5, 0x0, 0x2, 0x0, 0x4}, r2, 0x8, r3, 0x0) r4 = getpid() r5 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001400)={r4, r5, 0x0, 0x6, &(0x7f00000013c0)='+)]*\\\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0xb3, 0x4, 0xff, 0x0, 0x0, 0x840, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1e719450511652e5, @perf_bp, 0x0, 0x5, 0x4, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x490}, r1, 0x0, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x430, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x4008, 0x0, 0x0, 0x5, 0x3f, 0x0, 0x5}, 0x0, 0x8, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001340)={0x0, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000001300)='memory.events\x00'}, 0x30) unlink(&(0x7f0000000140)='./cgroup\x00') 18:24:54 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x73) recvmsg$kcm(r0, &(0x7f0000001800)={0x0, 0x0, 0x0}, 0x140) 18:24:54 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x0, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:54 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00'}, 0x10) 18:24:54 executing program 2: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000004c0)={&(0x7f0000000480)='./file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000800)='ns/user\x00') 18:24:55 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x1102c, 0x3ff, 0x0, 0x6cd5182d4248170a, 0x80, 0x4, 0x0, 0x0, 0x4b3}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x2d000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="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"/2601], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 18:24:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x7, 0x4, 0x8, 0xffff, 0x0, 0x1}, 0x48) 18:24:55 executing program 2: bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}, 0x38) 18:24:55 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x0, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000002c40)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x1aba, 0x1}, 0x48) 18:24:56 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x10, 0x0, 0x0, 0x9, 0x0, 0x1}, 0x48) 18:24:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000400)=""/252, 0x1a, 0xfc, 0x1}, 0x20) 18:24:56 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x3, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f00000002c0), 0x1}, 0x1102c, 0x3ff, 0x0, 0x6cd5182d4248170a, 0x80, 0x4, 0x0, 0x0, 0x4b3}, 0x0, 0x2, r0, 0x9) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40086602, &(0x7f0000000180)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) write$cgroup_int(r3, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x401}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000200), 0x2d000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001480)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c60ebab1c176bfdbb4dde984510c82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc28d0072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02fc22e6be45574d4ed88b39ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b3f9cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d01006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864487367d6bab101646ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0d77b294e097e293db7f002c0024ab2fd8e5e7fb178f047ba32548b4d32972cba6f49051cec1ff6f16231bbb90a2d201a5a47811a2278a03bf7700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f810741ffffffe0c7d8e94a27a06a4e3d9acee835fd63384f52b8eeb70571e5bbb3e6d2b5eba505000000968983811f832d064048c0e0bbe46984f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b059bc295aa0e38ff07edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d116b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb284fcfde9015769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c00020000000000009aa38a05e70591d5cdab1c268ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f0193c9a6e15994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443a6a64c7803760880af23fb3f430a5d11fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141fc98af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630ed5a0c2261bc2d5de6ee174534b8dfc0432ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f29c661d322ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79aa2832c04dc04db8b6536123b24be2ef80eb06b2db900fb30596c1574bda31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d65675bca9037426f643797be3e93da96b5643d3feed0b7c885d247c6b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfac497bc1389a3bafc0d3b51b5a34ab9e5746a1353322960964183842601e5364ecb6ad9168040388c7640bfa2f886c259718543de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e72daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf44195df032c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000000000da0ca67905e877893646d185a75582f866785af6b0149e336c31fb177e3e28620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f169df06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856dde57b05f045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3045b9c790984c6fb65fd7887bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212dedd245b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64437b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c10621ffe73a370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00"/2601], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 18:24:56 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x0, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:56 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f00000024c0)='ns/pid\x00') 18:24:56 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x2, 0x4, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0x2, &(0x7f00000009c0)={r0, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 18:24:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x19, 0x4, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x16, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 18:24:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x8, 0x4, 0x4, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x300}, 0x48) 18:24:56 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x0, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:56 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00'}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xd) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x3}, 0x10}, 0x80) 18:24:57 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:57 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) bpf$ITER_CREATE(0x21, &(0x7f00000008c0), 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)=""/225}, 0x20) 18:24:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000740), 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 18:24:57 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/63, 0x3f}, 0x40000040) 18:24:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00'}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xd) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x3}, 0x10}, 0x80) 18:24:57 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x0, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:57 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x8, 0x1, &(0x7f00000001c0)=@raw=[@generic], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 18:24:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:24:57 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x6, 0x4, 0x4, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x300}, 0x48) 18:24:57 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="b702000000008000bfa3000000000000070300000dfeffff720af0fff8ffff1971a4f0ff00000000b7060000080000001e64000000000000450404000100edff1604000001000a00b7040000000100006a0af2fe00000000850000001a000000b70000000000000095000000000000009e17890efeee5e2b7ff8a8cdc218e784909b849d5550ad855dab54d8877a6db61d69f2ffcaa17f82e11cb97c8adf1b831f422543e78461e57b2798779207c9a0c4eeff9674c7fcffffff971e43405d621ffbc9a4fd39b0b56bfe6508ebb3c4631f6dde53b9a53608c10556e5c1e2b8fee684b251e2d107ba7947212e577540497661826c36c5c1df1451ce5413a12e2d9f8004e26b7fcc059c065012828d872b36388b595f6dba87b8031106fb0289ce67a66afd9ac3d09e29a9d542ca9d85b5c9c88474895d679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd8048a967d9b912ef9f1dcc4ff8546fee41f5b2e7b91c61ced1eb57ad000000000000e8122a79c3e40000b59b0fc4937de6b0316dec3c080a802a000001000000000031b6a076555125aaffffa7be428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137e2524847d337ac976376d5074ce1d2638da3261c8362bb7c785d9b7c45218b100ee122040e11e3bdcb9d287ec31cd985841fe91212ee4a38af074c7e2ce006000000dc7777bfae5884e4ba1e9cc44846153ba0dec51a8e4abf07df093101c2c3bc4a59f22e46295a2d89a355bb9bba44f83fed3b2f96520100000040f1a8cde1fc1a1ef36c66880c8351cb06187641ed2f02835a8545a2374c09000000000000003c4e7b6d1a323c41a5d740b95d9317ff00000000000000f9db4a9a840000000033fbf7e9fa4f27245ca051d61c32bc3189af4ead1fca58746120fa0da48604000000000000003a6d824a7649c31576b3b69bd13f5a14c19790e24baf047fe3be299318f86ebb3094756894b2d1a4ff2fb76fed59c97ac9314408399485e659765d8e0000002000000000818d125c58a22151fabaaa7dc9eb40707927d240c6d29508fea81204e41040000000583ef12318bf8b2661f0df85a488f4b18d95b59ec07e5aa144dbae3df0000000000000000035d764eef4ee870807942cbd6a28384f6ba7c5fccca601000000e4e9fd18460296d89cc847973955daae01bd99ea1862fdb38410145ade0cf000000055a5efc9ff92e6eb37c3922c8aa02b2dcb4c977a61d989cf088e5c45009d27e1744d9cf4dd50bef1609c13975833c038aee18ed0dcbe865de50c5a2ed4cc3748672b7cd25067340a37475e0879fe9b3886dd054b43e7c485b2a43c3707d4c686bc5dea5b743d9e4b25adfb068e75b54c09481c8393e94053d99d0f7d67f7ed49b1c744d9f5b19c257136e6b2110000b5480a31359185c89956c2237e4c59d09b5aaab87f0e82802468398ffaac2fa66bb9afae6d449342aa30e443023f0554a756218077d418cf148af56491f0fa5b48582f1b13461fdf9fb9367f44d93d6ece0abe3e84b3279ab1a3f27d4afac67cf28594dd8ef1104c498e7bc63e2f6d3779c70d81c040b88451770eb988e9477d2de85be3555fe48e99d0880acd1c636dd3abff16db16594581d94dad70cc94c689707106000801a5cfad936253d110ca2aa3f13840b34ff956ee55602cad9bb209000000f32edea7a51515c035e55b31c91aeea878a8d51b4ce7bf9023b867ba3f450799f4dbfedad72c7dae607f9075877bd0db50fae9d0e0706c41ca92e71d81e06eaff63dab33c3cb3a8c28a6c2400f04412adeb9416ae3c8cfc8a7f6373247d903d8953de2a3cf07011db94b68af6176d0840a34a9aa493cfed41efc8377e2947947"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00'}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xd) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x3}, 0x10}, 0x80) 18:24:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@struct={0x3}]}, {0x0, [0x0, 0x0, 0x5f, 0x30]}}, &(0x7f0000000080)=""/248, 0x2a, 0xf8, 0x1}, 0x20) 18:24:57 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x0, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:58 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:58 executing program 2: socketpair(0x22, 0x0, 0x4, &(0x7f0000000000)) 18:24:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340)}, 0x42) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'batadv_slave_0\x00'}) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xd) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x6, 0x3}, 0x10}, 0x80) 18:24:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:24:58 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000008000000000000000900000085100000f9ffffff"], &(0x7f0000000040)='syzkaller\x00', 0x1, 0xfc, &(0x7f0000000200)=""/252, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:58 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x0, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@bloom_filter={0x1e, 0x0, 0x511, 0x9, 0x10ca, 0x1}, 0x48) 18:24:58 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0x7, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:58 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:24:58 executing program 2: socketpair(0x29, 0x5, 0xffffff80, &(0x7f0000000040)) 18:24:58 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:58 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x0, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:59 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000840)={&(0x7f0000000040)=@un=@abs, 0xfffffffffffffdb5, &(0x7f0000000580)=[{0x0}, {0x0}, {&(0x7f0000000180)="1eeec845ef94cfeed9f24b83f52dda175579b0b57518b1c8dac69188b56fa8499ddc63e159ef0e34f5286a3b2298bbaf383e7d01dcf4951f7b52ec42e806d5eca4618836a4508b78b7edf4cd9482846583042ee08436fd74b3570a3650c853b726082bdad94811de10bb73473773fd6cbed3b7d66264a1c557d37cfab5e9dfd51fa3925a2466685fcd72422ccf5b715c18", 0x91}], 0x100000000000007d, &(0x7f0000000600)=[{0x20, 0x0, 0x0, "2508bab5a43c4c7de4"}, {0x78, 0x0, 0x0, "d21ac020a52453ec2fbaa893fbb7d987d1f8fbee0f4a4dc5f654ffde62cfbf41593063e5db007ce537fd8250d363c6edec7505cd094bf17bd67d97c65753ff175a62a15d77fda70db26fb2d263a9bad700b0536917d6ba8094ad2c092e1fe1b2b0"}, {0x50, 0x0, 0x0, "82c29a8df24703659368b9432fff07b2e455a64af111066828e39a79f46b17518089a044a224d5ec68922e6f408368a515afb97d0a66453073"}], 0xe8}, 0x1) 18:24:59 executing program 1: socketpair(0x26, 0x5, 0x0, &(0x7f0000000300)) 18:24:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x9, 0x3, &(0x7f0000002300)=@framed={{0x61}}, &(0x7f0000002380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:24:59 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:24:59 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x5, &(0x7f0000000100)=@framed={{}, [@func, @func]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xf0, &(0x7f00000001c0)=""/240, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:24:59 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0x1b, 0x0, 0x0) 18:24:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000006980)={0x18, 0x4, &(0x7f00000067c0)=@raw=[@func, @kfunc, @map_fd], &(0x7f0000006800)='GPL\x00', 0x1, 0x86, &(0x7f0000006840)=""/134, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0xa, &(0x7f0000000100)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @exit, @func, @call, @map_fd, @kfunc]}, &(0x7f0000000180)='syzkaller\x00', 0x1, 0xf0, &(0x7f00000001c0)=""/240, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:24:59 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x19, 0x0, 0x0, 0x401, 0x0, 0x1}, 0x48) 18:25:00 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x20}, 0xc) 18:25:00 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:00 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x3, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x6, &(0x7f00000000c0)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @jmp]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xb0, &(0x7f0000000140)=""/176, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000540), 0x8, 0x10, &(0x7f0000000240), 0x10, 0xffffffffffffffff}, 0x80) 18:25:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:00 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xb, 0x0, 0x0, 0x55c0f7ba}, 0x48) 18:25:00 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x12, 0x6, &(0x7f00000000c0)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, 0x1}, @jmp]}, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xb0, &(0x7f0000000140)=""/176, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000540), 0x8, 0x10, &(0x7f0000000240), 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x19) 18:25:00 executing program 1: bpf$OBJ_GET_PROG(0x6, 0x0, 0x0) 18:25:00 executing program 3: bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)='r', 0x1}], 0x1}, 0x0) 18:25:00 executing program 3: bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002880)=ANY=[@ANYBLOB="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"/4320], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='sys_enter\x00', r0}, 0x10) getpid() openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 18:25:01 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup(r0, &(0x7f0000001780)='syz1\x00', 0x200002, 0x0) 18:25:01 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:01 executing program 3: bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000480)=""/188, 0x33, 0xbc, 0x1}, 0x20) 18:25:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x0, 0x0, 0x7, 0x7a}]}}, &(0x7f00000000c0)=""/200, 0x26, 0xc8, 0x1}, 0x20) 18:25:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x2) sendmsg$inet(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000002c0)='r', 0x1}], 0x1}, 0x0) 18:25:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002180)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000740)={r0, 0x11, 0x0, 0x0, 0x0}, 0x20) 18:25:01 executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x6, [@var={0x3}]}, {0x0, [0x0, 0x0, 0x2e, 0x2e]}}, &(0x7f0000001400)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 18:25:02 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x8, 0x0, 0x0, 0x0, 0x824}, 0x48) 18:25:02 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:02 executing program 4: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0xf, 0x0, 0x0, 0x0, 0x3709033e, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b80), 0x10, 0xffffffffffffffff}, 0x80) mkdir(&(0x7f00000004c0)='./file0\x00', 0x148) 18:25:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000000480)=""/188, 0x3e, 0xbc, 0x1}, 0x20) 18:25:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:02 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x9, 0x0, 0xd, 0x0, [{}, {}]}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000480)=""/188, 0x4e, 0xbc, 0x1}, 0x20) [ 808.318510][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.324838][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:25:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x2}]}}, &(0x7f0000000940)=""/166, 0x2a, 0xa6, 0x1}, 0x20) 18:25:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a00)={&(0x7f0000000840)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x6, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x61, 0x5f, 0x5f]}}, &(0x7f0000000940)=""/166, 0x36, 0xa6, 0x1}, 0x20) 18:25:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@enum={0x2}]}, {0x0, [0x0, 0x61, 0x2e]}}, &(0x7f0000000240)=""/164, 0x29, 0xa4, 0x1}, 0x20) 18:25:02 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc8, &(0x7f0000000240)=""/200, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:25:02 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:02 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x6, [@var={0x3}]}, {0x0, [0x0, 0x0, 0x2e, 0x8]}}, &(0x7f0000001400)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 18:25:02 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000740), 0x4) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x10}, 0x0) 18:25:02 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0}, 0x1f00) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff78, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x9, &(0x7f0000000880)=ANY=[@ANYBLOB="85100000040b000085100000050000008083060030770000181800006d7a8014f182dab14fa2892d94d98ed5e044c5cafab5448973ca35a2ef691c01c3153ab75cfb34171ccf8b2cf2293da901af987aaa17a6fe40044a7894256ce287620779d6c64a7f44db4ae7ef03a2bd84c4feffb6686db0c0812b4e8648ed9b32b3be95e48ecff92552dc06dc3f31ffbbc205f4430a25d16bb091bc9b6254e5ca3b631d305d389d06b35ef67647", @ANYRES32, @ANYBLOB="00000000000000008500"/30], &(0x7f0000000700)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x1, 0x6, 0x3f}, 0x10, 0x0, r2, 0x0, &(0x7f00000007c0)=[0x1]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) write$cgroup_type(r4, &(0x7f0000000000), 0xfd3678f9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x0, 0x0, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x10, 0x1, 0x65a6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 18:25:03 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:03 executing program 2: r0 = syz_clone(0x0, &(0x7f0000000280), 0x0, 0x0, &(0x7f0000000380), 0x0) perf_event_open(0x0, r0, 0x1, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002880)=ANY=[@ANYBLOB="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"/4320], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='sys_enter\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:25:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x3}]}, {0x0, [0x0, 0x0, 0x5f, 0x30, 0x2e]}}, &(0x7f0000001400)=""/4096, 0x2f, 0x1000, 0x1}, 0x20) 18:25:03 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x0, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2}, 0x0) 18:25:03 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x1, &(0x7f00000001c0)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}], &(0x7f0000000080)='syzkaller\x00', 0x3, 0xc8, &(0x7f0000000240)=""/200, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:25:03 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x0, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffdfffffffffffff, r0, 0x0) 18:25:04 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002740)={&(0x7f00000003c0)=@in6={0xa, 0x4e24, 0x0, @remote, 0x12}, 0x80, 0x0}, 0x0) 18:25:05 executing program 1: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x0, @local}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000340)="f9", 0xfef0}], 0x1, &(0x7f0000000500)=[@ip_retopts={{0x10}}, @ip_ttl={{0x14}}], 0x28}, 0x0) 18:25:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x0, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:05 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x0, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x4e22, @local}, 0x10, 0x0}, 0xe00) 18:25:05 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:25:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x0, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:05 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000080)=""/151, 0x28, 0x97, 0x1}, 0x20) close(r0) 18:25:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x0, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:05 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x0) 18:25:05 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x0, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5421, &(0x7f0000000040)) 18:25:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x41) 18:25:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x0, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:16 executing program 1: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000002740)={&(0x7f00000003c0)=@in6={0xa, 0x4e24, 0x0, @remote, 0x11}, 0x80, 0x0}, 0xbb8) 18:25:16 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x0, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:16 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xc) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000180)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000940)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x23000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:25:16 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:16 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x0, @local={0xac, 0x2}}, 0x10, &(0x7f0000000440)=[{&(0x7f0000000340)="f9", 0x1}], 0x1}, 0x41) 18:25:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:16 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x0, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:16 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {&(0x7f0000000500)='A', 0x1}], 0x2, &(0x7f0000000980)=ANY=[], 0x50}, 0x0) 18:25:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:16 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:16 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000500)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000a40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast1}}}], 0x20}, 0x0) 18:25:16 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x4e22, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_ttl={{0x14, 0x0, 0x7, 0x5}}], 0x18}, 0x0) 18:25:26 executing program 1: socketpair(0x10, 0x2, 0x0, &(0x7f0000000080)) 18:25:26 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000300)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @local, 0x517}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)='S', 0x1}], 0x1}, 0x0) 18:25:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x0, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:26 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000580)={&(0x7f0000000300)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}, 0x0) 18:25:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:26 executing program 4: perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x10a90, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x90, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0x7, 0x81, 0x0, 0x0, 0x8001, 0x8447, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x2010, 0x8, 0x0, 0x4, 0x6, 0xff, 0xff, 0x0, 0x5, 0x0, 0x8ae}, r1, 0xb, r0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x7, 0x1, 0x7f, 0xb, 0x0, 0x7, 0x10, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x102, 0x10001, 0x7f, 0x4, 0x0, 0x200, 0x4, 0x0, 0x8001, 0x0, 0xffff}, 0xffffffffffffffff, 0x4, r3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000850000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x48) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43432) 18:25:26 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000000)={&(0x7f0000000300)={0x2, 0x4e1e, @remote}, 0x10, 0x0}, 0x8010) 18:25:26 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 18:25:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x0, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x16, 0x16, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:25:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1b, 0x0, 0x0, 0x0, 0x10}, 0x48) 18:25:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:37 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:37 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:37 executing program 4: perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x10a90, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x90, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0x7, 0x81, 0x0, 0x0, 0x8001, 0x8447, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x2010, 0x8, 0x0, 0x4, 0x6, 0xff, 0xff, 0x0, 0x5, 0x0, 0x8ae}, r1, 0xb, r0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x7, 0x1, 0x7f, 0xb, 0x0, 0x7, 0x10, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x102, 0x10001, 0x7f, 0x4, 0x0, 0x200, 0x4, 0x0, 0x8001, 0x0, 0xffff}, 0xffffffffffffffff, 0x4, r3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000850000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x48) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43432) 18:25:37 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r1, 0x0, r0, 0x0) 18:25:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0), 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:37 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 18:25:37 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'caif0\x00', 0x2}) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000800)={'bond_slave_0\x00'}) close(r0) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) 18:25:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x1b}, 0x48) 18:25:37 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 18:25:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:25:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0xa, 0x8, 0x1, 0x52, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 18:25:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) 18:25:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:47 executing program 4: perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x10a90, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x90, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0x7, 0x81, 0x0, 0x0, 0x8001, 0x8447, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x2010, 0x8, 0x0, 0x4, 0x6, 0xff, 0xff, 0x0, 0x5, 0x0, 0x8ae}, r1, 0xb, r0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x7, 0x1, 0x7f, 0xb, 0x0, 0x7, 0x10, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x102, 0x10001, 0x7f, 0x4, 0x0, 0x200, 0x4, 0x0, 0x8001, 0x0, 0xffff}, 0xffffffffffffffff, 0x4, r3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000850000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x48) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43432) 18:25:47 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0x1, 0x1, 0x9, 0x8c7f}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 18:25:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:47 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000)='82x', &(0x7f00000000c0)=""/225}, 0x20) 18:25:48 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:56 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0x5, 0x7, 0x8a4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 18:25:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, &(0x7f00000000c0)=""/225}, 0x20) 18:25:56 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:56 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:56 executing program 4: perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000000000}, 0x10a90, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = perf_event_open(&(0x7f0000000700)={0x2, 0x80, 0x90, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x5, 0x80, 0x5, 0x7, 0x81, 0x0, 0x0, 0x8001, 0x8447, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x2010, 0x8, 0x0, 0x4, 0x6, 0xff, 0xff, 0x0, 0x5, 0x0, 0x8ae}, r1, 0xb, r0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) perf_event_open$cgroup(&(0x7f0000000440)={0x1, 0x80, 0x7, 0x1, 0x7f, 0xb, 0x0, 0x7, 0x10, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000180), 0x3}, 0x102, 0x10001, 0x7f, 0x4, 0x0, 0x200, 0x4, 0x0, 0x8001, 0x0, 0xffff}, 0xffffffffffffffff, 0x4, r3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000700060800000000000000008500000075000000850000000500000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x48) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43432) 18:25:56 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0x5, 0x0, 0x0, 0x0, 0x4}, 0x48) 18:25:56 executing program 2: socketpair(0x0, 0x80000, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x200000, 0x0, 0x0, &(0x7f0000004c80), 0x0, &(0x7f0000004d00)) 18:25:56 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 18:25:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) 18:25:57 executing program 2: syz_clone(0x49100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000008180)="a4") 18:25:57 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x0, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:25:57 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0x4, 0x4, 0x10001, 0x0, 0x1}, 0x48) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r0, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, 0x0, 0x0}, 0x20) [ 869.758714][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 869.765044][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:26:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)) 18:26:07 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 18:26:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x19, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x0, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:07 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000940)=@bpf_lsm={0x7, 0x3, &(0x7f0000000840)=@framed, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:07 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000009c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:07 executing program 4: r0 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000000)={'batadv0\x00', 0x200}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)) 18:26:07 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2401, 0x0) 18:26:07 executing program 3: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0xb00}, 0x48) 18:26:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x0, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:07 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x63, 0x11, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) 18:26:13 executing program 3: socketpair(0x10, 0x3, 0x8, &(0x7f0000001600)) 18:26:13 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b14, 0x0) 18:26:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x8, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x0, 0x0, 0xfffffff5}}, &(0x7f0000000080)='GPL\x00', 0x1, 0xa2, &(0x7f00000000c0)=""/162, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:13 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000003100)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 18:26:13 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x0, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:13 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:13 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 18:26:13 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40806685, &(0x7f00000005c0)=0x1) 18:26:13 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x9, 0x0, 0x0, 0x0, 0x63, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x68}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x70) 18:26:13 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003280)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000002c0)={r0, 0x0, 0x0}, 0x20) 18:26:13 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x0, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:13 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000a00)=""/4096, 0x26, 0x1000, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x20, &(0x7f0000000180)={0x0, 0x0, 0x0, &(0x7f00000000c0)=""/184, 0xb8}}, 0x10) 18:26:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2}]}]}, {0x0, [0x0]}}, &(0x7f0000000a00)=""/4096, 0x2f, 0x1000, 0x1}, 0x20) 18:26:24 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x19, 0x4, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r0, 0x7, 0x0}, 0x10) 18:26:24 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x19, 0x4, 0x4, 0xffff, 0x0, 0x1}, 0x48) close(r0) 18:26:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x19, 0x4, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f0000000b00)={r0, 0x0, 0x0}, 0x10) 18:26:24 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x1}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000000)) 18:26:24 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x0, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:24 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:24 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001800)={0x0, 0x0, &(0x7f0000001640)=[{&(0x7f00000001c0)="d079aa72c8df79202c0b47e3a6446b2ea9aaeec87865396f2a9250747e020b6e67b7caae69f51f5bd249c3ec7e486f4ce324736cd1a0042cbbc99ae31258d894da00ea", 0x43}, {&(0x7f0000000240)="62adf49ebbe9ca135fba801739f42113005c95993237202dc7a946510dbb6e537d7c96d3a4e1013e7922650e6bb83997dad240a22d5735a31f1115f0829e737fb0304d392e3a8da0427d042b8b3a246a7a92cbf88d2bc346aee76d4e4a1ab5524de101267ea8766131df418e24d4ea71e1fa44112c63c6068b181af4cc3d7ffb9ae59b24381a761057062b6daf6d46e8523f475595bf6e4f10f18bdb5625e1608991473508", 0xa5}, {&(0x7f0000000300)="ee68df53eef8f92b022f17cbdeaf6345208aa3ad57769d6d48e6540ba68ee754640addc04f9ad640ec43d40eb65b5b4fc10a07aa97875a60bfcf90194ec1bbc96d6f651134057915f96acf7b250203512ee3cf7ffcc06c8cd2d081842daa8333b8475ddeb69f177d4fbf343ff1f3c79d41a5d52bb2db4248afc7ee3ad82464468e9604ca51f902d8066524c24dd3c99f7d53a07fcc7c63bce59f38530eeef667f6d42ccaf55ce80b0e422e21d8aa3e28e59b04a9f9005533740ba9689be53489b99d5bbc95effe38518c2c0d5c17b9660229920d655682d4ad0e450c551f0b0a", 0xe0}, {&(0x7f0000000400)="a2874889e6cf4dfb21ef7af71a1d6e80c559c8c16a4cdec5198b384c20a5add2534c27edf22876ab24b6feb61b86d9e6436053174a4d762de3613768fbfc327c877053dbf6ac203efbcde9ff893d2e17aedbeff620407059281af4c60f37e2d373af2bfa8298f730e84d84e352c253264f98296c8f1035f08196f8cfa301d669542dd2b8f0f860ef3ccf374ec60332", 0x8f}, {&(0x7f00000004c0)="951938aa5a0718e6355ff547eb949ea31715b173411863b8db2fd3ae4560b23446185daa4f29104096431683a1c60d506d819077ae391c6566c68b41f6bee5d99bbf95ffadfe18ecec0af9a8fcd4f9cb0c01b1c90d3ee089c9acded00aaa162ae96c7acf24310d0f9b91dbcc11954a47fd305515503c9d42f93e1c1fe0262e1507f8b933087c35af90bc751f48fabbeac4435436456cf1ddd1e6338df4f7ed089e74cef44ef5", 0xa6}, {&(0x7f0000000580)="2f955c14feba2ed235118f5fa390aa68c28015f0ffba06", 0x17}, {&(0x7f00000005c0)="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", 0x17d}], 0x7, &(0x7f0000001700)=[{0xe8, 0x1, 0x0, "ca8987b4849afa3496a4cc33fedf9fb001ed61c434221d111d7a2616e27450817ae0237f307ae832e90c2c4f876a5318534e53640b13ace73c7eeb51393695a463133ddefedb588843d15a90c3c10727fb8cc856bdf4f2a49f3c38a8774850eed298fc3f0f818fa0846c538001d1a57202facec356c1a09adf19cf792c3a5405a42d720c24158c69bc218344cbba8aff883c0d23dd02b4fe0f1811580a0a84d0a137d1e3cdb21173c3f6a4eaa6d97db83e4f29037636a4d7619ab03002a0fb770971c1acf295fbc43ed03ff0206986bd4c"}], 0xe8}, 0x0) 18:26:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x19, 0x4, 0x4, 0xffff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f0000000b00)={r0, 0x0, 0x0}, 0x10) 18:26:24 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0x10, 0x1}], 0x10}, 0x0) 18:26:24 executing program 2: syz_clone(0x0, 0x0, 0xffffffffffffff09, 0x0, 0x0, 0x0) 18:26:24 executing program 3: socketpair(0x26, 0x0, 0x0, &(0x7f00000007c0)) 18:26:33 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x42000, 0x0) 18:26:33 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x6, 0x0, 0xd}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:33 executing program 3: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180), 0x8) 18:26:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f00000000c0)="90", 0x1}, {&(0x7f0000000180)="ca", 0x1}, {&(0x7f0000000200)="db", 0x1}, {0x0}, {&(0x7f00000005c0)='N', 0x1}], 0x5}, 0x0) 18:26:33 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:33 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') close(r0) 18:26:33 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001340)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000003600)={&(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, 0x80, &(0x7f00000012c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1}, 0x0) 18:26:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000180)="478bf9f4a80cc4c023b786ea294f408aa17e123b71e04febabd8cc6d4007e4a649a712d0ebc937dd67abb9093458edf4b521ff7f46d068733dc94a742b114fe7ebf991155a70a3af44841a673fc0535039eea65561ad1c127b78af1da51aeb40beb53a6488263bbe3c63ff01adacf6bd2a1ec98a300994df5cbf38eb8e655626443b1cc2b594ea1bac82da7d395724bb8c1eaf9115452deedf976a78f352b7a2f52635854373d250361d883ef36674ed464054965d5dccbf579119fe8f18d492d0", 0xc1}, {&(0x7f0000000280)="5135ce2e25fdd2ec5f99dde01b4f257b3a5da72381a58044275be0085fd896ecfcc803fd530950ff94ed9bdd5ca3f702a9e870c7b0055a993c7f0293965ef25f59e3e0ff417699b1568d8dc38bc207b25b996a0f66c7171aa38bdd98635cfbc91dddaf9d1635bfde9c", 0x69}, {&(0x7f0000001a40)="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", 0x6d7}], 0x3, &(0x7f00000014c0)=[{0x10}], 0x10}, 0x0) 18:26:33 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[{0xe8, 0x1, 0x0, "ca8987b4849afa3496a4cc33fedf9fb001ed61c434221d111d7a2616e27450817ae0237f307ae832e90c2c4f876a5318534e53640b13ace73c7eeb51393695a463133ddefedb588843d15a90c3c10727fb8cc856bdf4f2a49f3c38a8774850eed298fc3f0f818fa0846c538001d1a57202facec356c1a09adf19cf792c3a5405a42d720c24158c69bc218344cbba8aff883c0d23dd02b4fe0f1811580a0a84d0a137d1e3cdb21173c3f6a4eaa6d97db83e4f29037636a4d7619ab03002a0fb770971c1acf295fbc43ed03ff0206986bd4c"}, {0xe8, 0x0, 0x0, "4edab5014cdb52c0d852a4f217e5fb89d77ce1a1f01bbfffe9146a3dc0969bbd268f6ecd0fb8c154393b6b5ebe7bb796c56bc3d2c52995510944cdf8286bcd99866b00dd4c9a1b05fc2c1416e9e63c38ad13574aea6e494435d01137ff59fe575fd579d88203799d327412ea22240b0515c1005d3b15f0515eb4df2b308a69ef88168019b51ea6fe53ed8e2c9aa3dba2898d6253ef758c3e392de5c0b3bc86a7c0c77016129b3fc0c222efb431f5d02f1369090b67dcec353c5daf2ea2b010953fb07f94e8d7ba93b68611966a49e800f5"}, {0x140, 0x0, 0x0, "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"}], 0x310}, 0x0) 18:26:33 executing program 2: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0xc2af0bffaf96563f}, 0x20) 18:26:33 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:42 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002500)={&(0x7f00000001c0)=@name={0x1e, 0x2, 0x0, {{}, 0x4}}, 0x10, &(0x7f0000002480)=[{&(0x7f0000000200)="308f3185946f2747916402016bd8e89a7860eb713a899029834e4a92efd26db1d042e18773bb8af2854236d2659dd705da8d2a5a4e549600f993aac945cd7a564ae69a6f734dcca7fc8a487497955ad4890fb9c6dd", 0x55}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="ad56a18c20f0", 0x6}, {&(0x7f00000012c0)="90cfbf7778c91c16d7d1940bff4de33f7f40c08dba6f739f98f53a41fc198beabc1e41bbaac5e68956c208e00ca0354cf95d47c3227471c94e5fd20905ca12a0d750b9c9408bfdac32c3213239c463285a34b66a55cd5ca72f42f6ed4d5e78ea8ef744c819ebbd2a24abecf93a336ab43b0d303427302181e142a09870f595dff9b52aec6c8d58dbb3dc0238a552562d67346b625038aeb376083546eda421fb06b15b6a4489ced64021ebe5c3d35a388e527a059eb1a33023b2b85998866567ffb8cc12216faa95f345d504a662e553dcaaf60c299fb9ebd91235c3", 0xdc}, {&(0x7f00000013c0)="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", 0xc62}], 0x5}, 0x0) 18:26:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x1a000000}]}}, &(0x7f0000000740)=""/208, 0x26, 0xd0, 0x1}, 0x20) 18:26:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00', 0x4801}) ioctl$TUNGETDEVNETNS(r0, 0x54e3, 0x0) 18:26:42 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:42 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:42 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0xf4240, &(0x7f0000000200)=@framed={{}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xee, &(0x7f00000002c0)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:42 executing program 3: syz_clone(0x602d500, 0x0, 0x0, 0x0, 0x0, 0x0) 18:26:42 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000002500)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) 18:26:42 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:42 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00', 0x4801}) 18:26:42 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan0\x00', 0x4801}) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) 18:26:43 executing program 3: socketpair$unix(0x11, 0x3, 0x0, &(0x7f00000000c0)) 18:26:53 executing program 1: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000000)={&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x10) 18:26:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0xf4240, &(0x7f0000000200)=@framed={{}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xee, &(0x7f00000002c0)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:53 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:53 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB="18000000000000000100000001"], 0x18}, 0x0) 18:26:53 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001c00)={&(0x7f0000001940)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="f3fc6dc47872"}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000019c0)="d3", 0x1}, {&(0x7f0000001a00)='\f', 0x1}], 0x2}, 0x0) 18:26:53 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000130000005d0000000000000095000000000000000a621cf434b9eaafdc0a0000000000000000009cf05725caf1cae63487d30c028dcde5c0198e4796c5795ec6ed13623ce2b725a48f359456aa8a701c318c67ed53c0dd"], &(0x7f0000000000)='GPL\x00', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0x12, 0x0, &(0x7f0000000040)="263abd030e98ff4dc870bd6688a8640888a8", 0x0, 0x1200, 0x0, 0x41, 0xffffffffffffffa2}, 0x48) 18:26:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000740)=""/208, 0x1a, 0xd0, 0x1}, 0x20) 18:26:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x1, &(0x7f0000000040)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}], &(0x7f00000000c0)='GPL\x00', 0x3, 0xd8, &(0x7f0000000100)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:26:54 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x0, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:26:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4}}]}}, &(0x7f0000000740)=""/198, 0x32, 0xc6, 0x1}, 0x20) 18:26:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0xcf000000, 0x0, 0x0, 0x2}}, &(0x7f0000000740)=""/208, 0x1a, 0xd0, 0x1}, 0x20) 18:27:01 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001c00)={&(0x7f0000001940)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random="f3fc6dc47872"}, 0x80, &(0x7f0000001b40)=[{0x0}, {&(0x7f0000001a00)='\f', 0x1}, {&(0x7f0000001ac0)="d4", 0x1}], 0x3}, 0x0) 18:27:01 executing program 2: syz_clone(0x23085000, 0x0, 0x0, 0x0, 0x0, 0x0) 18:27:01 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x0, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:01 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='sys_enter\x00', r0}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000340)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cgroup.freeze\x00', 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 18:27:01 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0xf4240, &(0x7f0000000200)=@framed={{}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xee, &(0x7f00000002c0)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:01 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x9, 0x1, 0xffffffe0}, 0x48) 18:27:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x20000765, 0x2, [@const]}}, &(0x7f0000000740)=""/208, 0x26, 0xd0, 0x1}, 0x20) 18:27:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@enum={0x4, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x0]}}, &(0x7f00000002c0)=""/160, 0x33, 0xa0, 0x1}, 0x20) 18:27:01 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x0, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x7c, 0x0, 0x19}]}}, &(0x7f0000000180)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 18:27:01 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x5, 0x3, 0x401, 0x0, 0x1}, 0x48) [ 931.198699][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.205035][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:27:07 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003b80)={0x18, 0x7, &(0x7f0000003900)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_val, @cb_func, @map_idx], &(0x7f0000003980)='syzkaller\x00', 0x6, 0xdc, &(0x7f00000039c0)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:07 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0xf4240, &(0x7f0000000200)=@framed={{}, [@exit]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xee, &(0x7f00000002c0)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x3, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:07 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0xd, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x0, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x10, 0x207, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) 18:27:07 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) 18:27:07 executing program 2: socketpair$nbd(0x1, 0xf, 0x0, &(0x7f00000000c0)) 18:27:07 executing program 3: syz_clone(0x10020000, &(0x7f0000004e40), 0x0, 0x0, 0x0, 0x0) 18:27:07 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x3, &(0x7f0000001d00)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000001d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x0, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:16 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x880, 0x0) 18:27:16 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x3, &(0x7f0000001d00)=@framed, &(0x7f0000001d40)='syzkaller\x00', 0x5, 0xfc, &(0x7f0000001d80)=""/252, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000001e80), 0x8, 0x10, 0x0}, 0x80) 18:27:16 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000002780)='cgroup.events\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={@map=r1}, 0x10) 18:27:16 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN(0x23, &(0x7f0000000080)={0x0}, 0x10) 18:27:16 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x0, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:16 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:16 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x62001, 0x0) 18:27:16 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x9, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:16 executing program 2: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x18}, 0xc) 18:27:17 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0x0, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:17 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x3, &(0x7f0000001d00)=@framed, &(0x7f0000001d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:17 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000070006080000000000000000850000007500000085"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='ext4_es_insert_delayed_block\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43432) 18:27:26 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) 18:27:26 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x3, &(0x7f0000001d00)=@framed, &(0x7f0000001d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:26 executing program 4: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 18:27:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0x0, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x0, 0x0, &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:26 executing program 2: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x10, 0x84}], 0x10}, 0x0) 18:27:26 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x3, &(0x7f0000001d00)=@framed, &(0x7f0000001d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:26 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000680)={&(0x7f0000000000)=@id, 0x10, 0x0}, 0x0) 18:27:26 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x2) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0x0, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:26 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001f00)={0x6, 0x3, &(0x7f0000001d00)=@framed, &(0x7f0000001d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:27:26 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:27:34 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x2) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:34 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) 18:27:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="2000000000000000840000000800000003e334e044443a3b060000000000f9cf9422fa01fa10d42043d5de1284fa7d47b51cebd530d21b27b1ea224980a1d872742f90fdd521f801ec2d89cd646827d500"/94], 0x20, 0xfe80}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x1}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x4000) 18:27:34 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:34 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x2) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:34 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:34 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x5452, &(0x7f0000000040)=0x800) 18:27:34 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:35 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000680)={&(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x4}}, 0x10, 0x0}, 0x0) 18:27:35 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="2000000000000000840000000800000003e334e044443a3b060000000000f9cf9422fa01fa10d42043d5de1284fa7d47b51cebd530d21b27b1ea224980a1d872742f90fdd521f801ec2d89cd646827d500"/94], 0x20, 0xfe80}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x1}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x4000) 18:27:35 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="2000000000000000840000000800000003e334e044443a3b060000000000f9cf9422fa01fa10d42043d5de1284fa7d47b51cebd530d21b27b1ea224980a1d872742f90fdd521f801ec2d89cd646827d500"/94], 0x20, 0xfe80}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x1}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x4000) 18:27:47 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x2) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:47 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:47 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:47 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:47 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="2000000000000000840000000800000003e334e044443a3b060000000000f9cf9422fa01fa10d42043d5de1284fa7d47b51cebd530d21b27b1ea224980a1d872742f90fdd521f801ec2d89cd646827d500"/94], 0x20, 0xfe80}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x1}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x4000) 18:27:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:47 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:27:48 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000000)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000700)=[{&(0x7f00000000c0)="8e", 0x1}], 0x1, &(0x7f0000000300)=ANY=[@ANYBLOB="2000000000000000840000000800000003e334e044443a3b060000000000f9cf9422fa01fa10d42043d5de1284fa7d47b51cebd530d21b27b1ea224980a1d872742f90fdd521f801ec2d89cd646827d500"/94], 0x20, 0xfe80}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x1}, 0x0, 0x10000000000000, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000003c0)={r0}) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x4000) 18:27:48 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:48 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:27:48 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:00 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) getpid() ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:00 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:00 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:00 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r0) socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:00 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open$cgroup(0x0, r1, 0x0, r0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086607, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000007000608000000000000000085000000750000008500000005"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='ext4_es_insert_delayed_block\x00', r3}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x43432) 18:28:00 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:01 executing program 4: r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001580)=[{0x10}, {0x10, 0x84, 0x75ec}], 0x20}, 0x0) 18:28:01 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x0, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:01 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000011c0)={0x6, 0x3, &(0x7f0000000d80)=@framed, &(0x7f0000000dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:28:01 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socketpair(0x18, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_type(r1, &(0x7f0000000240), 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) close(r1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='{,\xe2,,!,/+\x00') write$cgroup_int(r0, &(0x7f0000000180)=0x80, 0x12) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44500, 0x3ff, 0x4, 0x1, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000080)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, 0x0}, 0x20) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x2000e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0xffff, 0x20000}, 0x8048, 0x5, 0x800000, 0x2, 0x3ffc, 0x800000, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:01 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x0, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) [ 988.286484][T28313] : renamed from rose0 [ 992.646171][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.652626][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:28:11 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x7) getpid() ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) close(r1) socket$kcm(0x10, 0x0, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:11 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:11 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000240)={r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[0x0], 0x1}, 0x20) 18:28:11 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x0, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:11 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_type(r1, &(0x7f0000000240), 0x2, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) close(r1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='{,\xe2,,!,/+\x00') write$cgroup_int(r0, &(0x7f0000000180)=0x80, 0x12) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44500, 0x3ff, 0x4, 0x1, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552b, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8923, &(0x7f0000000080)) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, 0x0}, 0x20) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x2000e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_config_ext={0xffff, 0x20000}, 0x8048, 0x5, 0x800000, 0x2, 0x3ffc, 0x800000, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:11 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x5452, 0xffffffffffffffff) 18:28:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x10, 0x0, 0x0, 0xfffffffa}, 0x48) 18:28:11 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) 18:28:11 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x0, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:11 executing program 3: syz_clone(0x50b86100, 0x0, 0xffffffffffffff35, 0x0, 0x0, 0x0) 18:28:11 executing program 2: bpf$OBJ_GET_PROG(0x22, &(0x7f0000000440)={0x0, 0x0, 0x18}, 0x10) 18:28:12 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x0, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "07931f"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '%'}]}}, &(0x7f0000000400)=""/170, 0x36, 0xaa, 0x1}, 0x20) 18:28:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 18:28:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'C'}]}}, &(0x7f0000000100)=""/216, 0x2a, 0xd8, 0x1}, 0x20) 18:28:26 executing program 3: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 18:28:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x0, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:26 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:26 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:28:26 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:28:26 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x9, 0x3, &(0x7f0000002300)=@framed={{0x18, 0x0, 0x5}}, &(0x7f0000002380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:28:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xd, &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:28:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:26 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xd4f, 0x0, 0x3f, 0x0, 0x80, 0x0, 0x80}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='GPL\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) 18:28:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0185879, &(0x7f0000000080)) 18:28:35 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1, 0x5, 0x81, 0x240}, 0x48) 18:28:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000080)=""/151, 0x28, 0x97, 0x1}, 0x20) 18:28:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000083"], &(0x7f00000001c0)=""/159, 0x9b, 0x9f, 0x1}, 0x20) 18:28:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:35 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:35 executing program 4: perf_event_open$cgroup(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:28:35 executing program 2: syz_clone(0x3e003180, 0x0, 0x0, 0x0, 0x0, 0x0) 18:28:35 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xc, 0x16, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 18:28:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x236}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x37a1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb9c, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x100, 0x0, 0x4, 0x3f, 0x0, 0x19a6, 0x0, 0x1f, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair(0x1, 0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 18:28:35 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000c00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xa, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {0x9}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000cc0)=""/188, 0x4e, 0xbc, 0x1}, 0x20) 18:28:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x8, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6, 0x3, 0x3}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000001ac0)=""/4096, 0x38, 0x1000, 0x1}, 0x20) 18:28:44 executing program 4: bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={0xffffffffffffffff, 0x0}, 0x20) 18:28:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x41009432, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:44 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:44 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="8520000005000000850944a6100000fdffffff051e000004000000db025b7482e698cdaf93ed43072b93805e09667dc1a7420cb256dc488088b777f1707a5144e13baebda3042a5135550d2546f805a687330b83ceb448a024f6993bbc08f3eb69e746d3380c54ef5f0be30223c4f608cc7aa6d40fdf8cbcbaaccbb3b5fd06694031504b7a7ecff94ec43234ce29406dd413044cbe6c0ecfa81006a944c3e76e35533ea4e47a6d86adde8745fba8dfbbd95f9e6bbd6811900fe03706cd04dd0e75008027d9b9054328692cddec758c68e7a92b4d48bbb1bf3dcbe380639a9318d6054f1c0bdd327666aa2b960fa21d708122271924621141462be13e9ff2d186e6d8e29a8f5b19e79bf586a0398b040a770bea634750641f1c7d2fa8d1ba8a8c290b6800460c2c30a2b48f333c115c6241ce96a5b1e32d1dcc3c2fc5e712020881d9d88a91"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:44 executing program 3: perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:28:44 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:28:44 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 18:28:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x41009432, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:44 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x2}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000080)=""/151, 0x28, 0x97, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x20, &(0x7f0000000300)={0x0, 0x0, 0x0, &(0x7f0000000200)=""/234, 0xea}}, 0x10) 18:28:44 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'bond0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{}, {}]}) 18:28:54 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/cgroup\x00') openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 18:28:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x41009432, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') bpf$ITER_CREATE(0x21, 0x0, 0x0) 18:28:54 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:54 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'bond0\x00', 0x4002}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{}, {0x5}]}) 18:28:54 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:54 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000040400000000000000100050000000850000005000000095000000007322e8fdc6225a9fa6caf76fe7351dd78806ac88e29864d3628819dca4e6cf0ef84f0b02e1a013019fb0e4674b6f58f50a94fd"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x660c, 0x0) 18:28:54 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000003980)={0x14, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="852000000500000020ee4fd9abd2a7f54efced9fa94d18271000555b8f748157e6dc387dbfb091b82b1614e3c31cdb306cbc103d840f2728965ec2959228012df45ba39fd7f49449c4fba6a29ae1921f34f37e94841263af70abf9382fcda40f91", @ANYRES32=r0, @ANYRESHEX=r1], &(0x7f0000000540)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000003600)={0x0, 0x10}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x10, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="180000ffff04000000000000ff07000085100000ff0300001800000040000000e9000000018000000d1bfcff1000000018190000", @ANYRES32, @ANYBLOB="00040000000000110debb8e01e69fa00950000008a000000"], &(0x7f0000000400)='GPL\x00', 0xcff, 0xdf, &(0x7f0000000440)=""/223, 0x40f00, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x2, 0x80000001, 0xffffff22}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x1e}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff78, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.mems\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 18:28:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x41009432, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 18:28:54 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x0, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:28:54 executing program 2: perf_event_open(&(0x7f0000000100)={0x0, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b7a5631}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:28:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x96000000, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/151, 0x1a, 0x97, 0x1}, 0x20) 18:28:55 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x858f02323f0abe26, 0x0) close(r0) [ 1054.078682][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.085006][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:29:25 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') 18:29:25 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:29:25 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x0, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:25 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:25 executing program 3: bpf$BPF_GET_PROG_INFO(0x1e, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 18:29:25 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000003980)={0x14, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="852000000500000020ee4fd9abd2a7f54efced9fa94d18271000555b8f748157e6dc387dbfb091b82b1614e3c31cdb306cbc103d840f2728965ec2959228012df45ba39fd7f49449c4fba6a29ae1921f34f37e94841263af70abf9382fcda40f91", @ANYRES32=r0, @ANYRESHEX=r1], &(0x7f0000000540)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000003600)={0x0, 0x10}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x10, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="180000ffff04000000000000ff07000085100000ff0300001800000040000000e9000000018000000d1bfcff1000000018190000", @ANYRES32, @ANYBLOB="00040000000000110debb8e01e69fa00950000008a000000"], &(0x7f0000000400)='GPL\x00', 0xcff, 0xdf, &(0x7f0000000440)=""/223, 0x40f00, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x2, 0x80000001, 0xffffff22}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x1e}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff78, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.mems\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 18:29:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x16, 0x0, 0x25, 0x7ff}, 0x48) 18:29:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000004c0)=[{0x0}, {&(0x7f00000001c0)=""/252, 0xfc}, {&(0x7f0000001400)=""/4096, 0x1000}], 0x3}, 0x2002) sendmsg$sock(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000540)="5391f3ad78b67ede5f35810c563b043d604ca6ce7ee93d1b42ec908b6aa2f997ef3d252f55182671cbdff759ad038afdaacef3cac82acc3f89c7a04e640ac47e1310f3166de23919466db7ade6b890e70daecb058fc11726ee91f36b752e2d0bf89de383d00e446272d0b4acfa7258c5cae80edbe6a1702fd50ca52a27ab49e6482599fa8a779da8e417a874c865626c3442313b2dfc887a22a32c98e01bccef0a0d2b5c6c0d6f02045af2cda6692e6323cdc7083fcf938074cf2d99a27b8259912c789489c705ee0b45fe18dc12e73488916fb1f287c740d4ab88f653ad42dabc5f6f13bb5100bc4e0ab381b6f82e44c6efbabc017e9844d6565dc7a0", 0xfd}], 0x1}, 0x0) 18:29:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000015c0)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x5f, 0x5f]}}, &(0x7f00000005c0)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 18:29:26 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x0, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:26 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000100)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x7, 0x0}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000080)=r0, 0x4) 18:29:26 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') ioctl$TUNSETTXFILTER(r0, 0xb701, 0x0) 18:29:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xf, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x48) 18:29:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000011c0)={0x0, 0x3a400, &(0x7f0000000040)=@framed={{}, [@func]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x100b, &(0x7f0000001240)=""/4107, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x1000, &(0x7f0000002280)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:29:36 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) r3 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000140), 0x12) 18:29:36 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x0, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:36 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:36 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000003980)={0x14, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="852000000500000020ee4fd9abd2a7f54efced9fa94d18271000555b8f748157e6dc387dbfb091b82b1614e3c31cdb306cbc103d840f2728965ec2959228012df45ba39fd7f49449c4fba6a29ae1921f34f37e94841263af70abf9382fcda40f91", @ANYRES32=r0, @ANYRESHEX=r1], &(0x7f0000000540)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000003600)={0x0, 0x10}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x10, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="180000ffff04000000000000ff07000085100000ff0300001800000040000000e9000000018000000d1bfcff1000000018190000", @ANYRES32, @ANYBLOB="00040000000000110debb8e01e69fa00950000008a000000"], &(0x7f0000000400)='GPL\x00', 0xcff, 0xdf, &(0x7f0000000440)=""/223, 0x40f00, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x2, 0x80000001, 0xffffff22}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x1e}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff78, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.mems\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 18:29:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x7, 0x0, 0x0, 0x6}, 0x48) 18:29:36 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x0, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:36 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'\x00', 0x1}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 18:29:36 executing program 3: syz_clone(0x23040000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:29:36 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x0, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001f80)={0x18, 0x1, &(0x7f0000001b80)=@raw=[@kfunc], &(0x7f0000001c80)='GPL\x00', 0x7, 0xa3, &(0x7f0000001cc0)=""/163, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:29:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_subtree(r0, &(0x7f0000001800)=ANY=[], 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x6628, 0x0) 18:29:49 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x0) 18:29:49 executing program 2: socketpair$unix(0xa, 0x2, 0x0, &(0x7f0000000780)) 18:29:49 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x0, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:49 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x0, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:49 executing program 4: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000003980)={0x14, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="852000000500000020ee4fd9abd2a7f54efced9fa94d18271000555b8f748157e6dc387dbfb091b82b1614e3c31cdb306cbc103d840f2728965ec2959228012df45ba39fd7f49449c4fba6a29ae1921f34f37e94841263af70abf9382fcda40f91", @ANYRES32=r0, @ANYRESHEX=r1], &(0x7f0000000540)='syzkaller\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000003600)={0x0, 0x10}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x10, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="180000ffff04000000000000ff07000085100000ff0300001800000040000000e9000000018000000d1bfcff1000000018190000", @ANYRES32, @ANYBLOB="00040000000000110debb8e01e69fa00950000008a000000"], &(0x7f0000000400)='GPL\x00', 0xcff, 0xdf, &(0x7f0000000440)=""/223, 0x40f00, 0x1e, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x2, 0x80000001, 0xffffff22}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000b00)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x1e}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff78, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup(r2, &(0x7f0000000180)='syz0\x00', 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f00000001c0)='cpuset.mems\x00', 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) write$cgroup_type(r5, &(0x7f0000000000), 0xfd3678f9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0x12) 18:29:49 executing program 3: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 18:29:49 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x200000000006013}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 18:29:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x1, 0x3, 0x85}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000002c0)="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", 0x0}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000780), 0x800, r0}, 0x38) 18:29:49 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x0, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:29:49 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x1, 0x3, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000780), 0x800, r0}, 0x38) bpf$MAP_DELETE_ELEM(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000380), 0x20000000}, 0x20) 18:29:50 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x0, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:05 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0c0583b, &(0x7f0000000000)) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x5, 0x2000, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x50248, 0x0, 0x2, 0x7, 0x0, 0x1, 0x3, 0x0, 0x4, 0x0, 0xfff}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) 18:30:05 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_macvtap\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8932, &(0x7f0000000080)) 18:30:05 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001500)=@base={0x1, 0x1, 0x3, 0x85}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140), &(0x7f0000000780), 0x800, r0}, 0x38) bpf$MAP_DELETE_ELEM(0x15, &(0x7f00000000c0)={r0, &(0x7f0000000380), 0x20000000}, 0x20) 18:30:05 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:05 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:07 executing program 4: syz_clone(0x2802000, 0x0, 0x0, 0x0, 0x0, 0x0) 18:30:07 executing program 2: socketpair(0x2, 0x2, 0x0, &(0x7f0000000980)) 18:30:07 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:07 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x6}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:30:07 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000380)=""/255, 0x3b, 0xff, 0x1}, 0x20) 18:30:07 executing program 3: r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) [ 1115.518348][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.524620][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:30:30 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x210, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0c0583b, &(0x7f0000000000)) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x5, 0x2000, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x50248, 0x0, 0x2, 0x7, 0x0, 0x1, 0x3, 0x0, 0x4, 0x0, 0xfff}, 0x0, 0xc, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) 18:30:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0x9, 0x7, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 18:30:30 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xd, 0x0, 0x0, 0xac20eec8c455c4d1}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:30:30 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0xd6, 0x100}, {0x3f, 0x1f, 0x1}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:30 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x0, 0x0, &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:30 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x9, 0x102, 0x7, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000000), 0x0}, 0x20) 18:30:30 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x1, 0x1e, 0x7, 0x2, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={r0, 0x58, &(0x7f0000000440)={0x0, 0x0}}, 0x10) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r1}, 0xc) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000280)={r2, &(0x7f0000000500), 0x0}, 0x20) 18:30:30 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x4, 0x0, 0xa}]}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:30:30 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'macvlan0\x00', 0x2}) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) close(r0) 18:30:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@fwd={0x2}]}, {0x0, [0x0, 0x61, 0x5f]}}, &(0x7f0000000300)=""/253, 0x29, 0xfd, 0x1}, 0x20) 18:30:30 executing program 2: syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)="4f4b4fd669f13a7ed6c5bb165113a06c2524b11cafe35f024420") 18:30:30 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:55 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x4, 0xa7, &(0x7f00000000c0)=""/167, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:30:55 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x288c0, 0x0) 18:30:55 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001400)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x5}, 0x48) 18:30:55 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:55 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x0, &(0x7f00000005c0), &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:55 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x4, &(0x7f0000000000)=@framed={{}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xa7, &(0x7f00000000c0)=""/167, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:30:55 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 18:30:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002740)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf2364149215108333719acd97cfa107d40224edc5465a93df8513a32ec450bebc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4929330142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da8c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000dd11e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b9803f25ed622b435ac15f2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341b74abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb232bbdb9dc33cbd7643866fde41f94290c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d2e959efc71f665c4d75cf2458e3322c9062ece84c99a061997a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a998de44aeadea2a40da8daccf080842a4867217373934bbd42dcb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcd62981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba495aea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535b1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294059323e7a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bb8b40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1785eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba891cea599b079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fd78f9743af932cd6db49a47613808bad959719c0000000000378a921c7f7f6933c2e24c7e800003c9e8095e02985f28de0bbc76d58dd92606b1ef6486c85fa3e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a391f03daca80f08f0e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e112645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c000000000000000000000000000000a1c3da144589dcaddb71cf9374843e23f992a237a9040747e0434a8a643990b4059a98411ce867d1af7e8ea89f49e6f564d4dce8a7d6939a92144e43a7f39e83bd247e03a09dba000000000000000000000000aaf033d47249c8444bc13844cbf1be617d82b269e5ea0c0d525603c0ec543ea581f63893ae414a6683e941fdbd6ea6cfc5f8744583c0aa766a65321f907927a59d75b47f06895e8471ebc2840ce5bd054df223fb09b9c739ad64cfcfd2d498b0f11056f6c40874cb977c99b6bc1a8732198a17e610082b7ce0365f271b11d4b4a3d4c7d0bb273f406ecd4b26c93151c30f5a26999140"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) bpf$ITER_CREATE(0x10, 0x0, 0x1100) 18:30:55 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) bpf$ITER_CREATE(0x1c, 0x0, 0x0) 18:30:55 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x7, &(0x7f0000000000)=[{0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:30:55 executing program 2: socketpair(0xb, 0xa, 0x0, &(0x7f0000000040)) syz_clone(0x40000000, 0x0, 0x0, &(0x7f00000006c0), &(0x7f0000000a00), 0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x20000000000000ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:30:55 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x3, &(0x7f0000000a40)=@framed, &(0x7f0000000a80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0), 0x8, 0x10, 0x0}, 0x80) [ 1176.958322][ T1236] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.964602][ T1236] ieee802154 phy1 wpan1: encryption failed: -22 18:31:14 executing program 1: socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0}, 0x1f00) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff78, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000280), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0), 0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000340), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x4, 0x9, &(0x7f0000000880)=ANY=[@ANYBLOB="85100000040b000085100000050000008083060030770000181800006d7a8014f182dab14fa2892d94d98ed5e044c5cafab5448973ca35a2ef691c01c3153ab75cfb34171ccf8b2cf2293da901af987aaa17a6fe40044a7894256ce287620779d6c64a7f44db4ae7ef03a2bd84c4feffb6686db0c0812b4e8648ed9b32b3be95e48ecff92552dc06dc3f31ffbbc205f4430a25d16bb091bc9b6254e5ca3b631d305d389d06b35ef67647", @ANYRES32, @ANYBLOB="00000000000000008500"/30], &(0x7f0000000700)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x1d, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x5, 0x1, 0x6, 0x3f}, 0x10, 0x0, r2, 0x0, &(0x7f00000007c0)=[0xffffffffffffffff, 0x1]}, 0x80) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) write$cgroup_type(r4, &(0x7f0000000000), 0xfd3678f9) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x7c301, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x400, 0x0, 0x0, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_int(r3, &(0x7f0000000300), 0x12) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x10, 0x1, 0x65a6, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) 18:31:14 executing program 3: syz_clone(0x13001500, 0x0, 0x0, 0x0, 0x0, 0x0) 18:31:14 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x0, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:31:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@fwd={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000080)=""/201, 0x2c, 0xc9, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) 18:31:14 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x0, &(0x7f00000005c0), &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:31:14 executing program 4: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)}, 0x48) 18:31:14 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40106614, &(0x7f0000000000)) 18:31:15 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x15, &(0x7f0000000740), 0x10) 18:31:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000740), 0x4) sendmsg$inet(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@cred={{0x1c}}], 0x20}, 0x0) 18:31:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x10, &(0x7f0000000740), 0x4) 18:31:15 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x28}]}) 18:31:15 executing program 3: bpf$ITER_CREATE(0xa, 0x0, 0x0) 18:31:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x9, 0x7, 0xffff, 0xdc}, 0x48) 18:31:41 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x0, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:31:41 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x1, 0x16, 0x8, 0x7f, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x5, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="0000000000000000710064000000000018000000000000000000000000000000950800000000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 18:31:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x26, &(0x7f0000000740), 0x4) 18:31:41 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYRES32, @ANYBLOB="00000000000000000d10f8ff010000009500000000000007"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x0, &(0x7f00000005c0), &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r2, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r4, &(0x7f0000000080), 0x11ffffce1) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x15, 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x4, 0x61, &(0x7f0000000380)=""/97, 0x40f00, 0xc, '\x00', r2, 0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0xba, 0x6}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[r3, r1, r3, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r6, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:31:41 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000002740)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x10) bpf$ITER_CREATE(0x1d, 0x0, 0x0) 18:31:41 executing program 2: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001380)={0x6, 0x3, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x600}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1207.283362][T28696] ------------[ cut here ]------------ [ 1207.305972][T28696] trace type BPF program uses run-time allocation [ 1207.367591][T28696] WARNING: CPU: 1 PID: 28696 at kernel/bpf/verifier.c:12652 bpf_check+0xb09a/0xb8e0 [ 1207.377205][T28696] Modules linked in: 18:31:41 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x0, 0xd6, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) 18:31:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)=0x1389) [ 1207.426984][T28696] CPU: 1 PID: 28696 Comm: syz-executor.3 Not tainted 5.19.0-syzkaller-14074-g8cc61b7a6416 #0 [ 1207.464551][T28696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 18:31:41 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) [ 1207.508234][T28696] RIP: 0010:bpf_check+0xb09a/0xb8e0 18:31:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001600)={&(0x7f0000001500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x76, 0x0, 0x6f}]}}, &(0x7f0000001540)=""/192, 0x2a, 0xc0, 0x1}, 0x20) [ 1207.607476][T28696] Code: e9 09 a1 ff ff 4c 89 ef e8 53 97 37 00 e9 8e 64 ff ff e8 f9 1c eb ff 48 c7 c7 40 89 f4 89 c6 05 d9 a3 38 0c 01 e8 93 f4 a8 07 <0f> 0b e9 51 a0 ff ff 4c 8b bd 88 fe ff ff e8 d3 1c eb ff 48 c7 c6 [ 1207.637602][T28696] RSP: 0018:ffffc9000361f8a0 EFLAGS: 00010282 [ 1207.644214][T28696] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000000 [ 1207.685690][T28696] RDX: 0000000000040000 RSI: ffffffff8161f148 RDI: fffff520006c3f06 [ 1207.710646][T28696] RBP: ffffc9000361fb00 R08: 0000000000000005 R09: 0000000000000000 18:31:41 executing program 0: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='cachefiles_mkdir\x00'}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_ext={0x1c, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000700000000000000800000001860000000000000000000000000008018170000", @ANYBLOB="00000000000000000d10f8ff010000"], &(0x7f0000000440)='syzkaller\x00', 0x18, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x5, 0x5}, 0x8, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000f40)={0x10, 0x1, &(0x7f00000005c0)=@raw=[@generic={0x40, 0x6, 0x8, 0x7, 0x2}], &(0x7f0000000700)='GPL\x00', 0xf4, 0x5e, &(0x7f0000000c00)=""/94, 0x100, 0x1, '\x00', r1, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000e40)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x4, 0x8, 0x1, 0x7}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000f00)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1]}, 0x80) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000900)={0xffffffffffffffff, 0x20, 0x10}, 0xc) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x11ffffce1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000140)={0x8, &(0x7f0000000000)=[{0x0, 0x20, 0x0, 0x100}, {0x3f, 0x1f, 0x1, 0x56d}, {0x3f, 0x3, 0x0, 0x6}, {0x8, 0x1, 0xff, 0x2}, {0x0, 0x5, 0x80, 0x5}, {0x9, 0x2, 0x0, 0x2}, {0x3f, 0x7, 0x5, 0x1}, {0x8000, 0xc0, 0xa6, 0xfffffffb}]}) write$cgroup_type(r2, &(0x7f0000000180), 0xfdef) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x2, 0x5, 0x0) sendmsg$inet(r3, &(0x7f0000002040)={&(0x7f0000000b40)={0x2, 0x0, @rand_addr=0x88}, 0x10, &(0x7f0000001f40)=[{&(0x7f0000000b00)='Q', 0xcb68}], 0x14}, 0x5c) [ 1207.733748][T28696] R10: 0000000080000000 R11: 0000000000000000 R12: ffff888047c0f000 [ 1207.752687][T28696] R13: dffffc0000000000 R14: ffffc900035dd060 R15: 0000000000000003 [ 1207.761908][T28696] FS: 00007fb93f849700(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1207.771564][T28696] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1207.788478][T28696] CR2: 000055555596e708 CR3: 0000000077a7c000 CR4: 00000000003506f0 [ 1207.796598][T28696] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1207.810515][T28696] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1207.826085][T28696] Call Trace: [ 1207.831800][T28696] [ 1207.837159][T28696] ? bpf_get_btf_vmlinux+0x10/0x10 [ 1207.846260][T28696] ? lock_downgrade+0x6e0/0x6e0 [ 1207.854744][T28696] ? __might_fault+0xd1/0x170 [ 1207.864073][T28696] ? lock_downgrade+0x6e0/0x6e0 [ 1207.885036][T28696] ? ktime_get_with_offset+0x3f2/0x500 [ 1207.891008][T28696] ? memset+0x20/0x40 [ 1207.895046][T28696] ? bpf_obj_name_cpy+0x144/0x1a0 [ 1207.907390][T28696] bpf_prog_load+0x13cb/0x2230 [ 1207.912219][T28696] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 1207.926773][T28696] ? __might_fault+0xd1/0x170 [ 1207.933225][T28696] ? lock_downgrade+0x6e0/0x6e0 [ 1207.946073][T28696] ? security_bpf+0x83/0xb0 [ 1207.951004][T28696] __sys_bpf+0x1e3d/0x5f80 [ 1207.956468][T28696] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1207.973402][T28696] ? bpf_perf_link_attach+0x520/0x520 [ 1207.981702][T28696] ? find_held_lock+0x2d/0x110 [ 1207.986529][T28696] ? __ct_user_exit+0xff/0x150 [ 1207.997001][T28696] ? syscall_enter_from_user_mode+0x22/0xb0 [ 1208.005859][T28696] __x64_sys_bpf+0x75/0xb0 [ 1208.015940][T28696] ? syscall_enter_from_user_mode+0x22/0xb0 [ 1208.024761][T28696] do_syscall_64+0x35/0xb0 [ 1208.035325][T28696] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1208.045405][T28696] RIP: 0033:0x7fb93e689279 [ 1208.055307][T28696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1208.078478][T28696] RSP: 002b:00007fb93f849168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1208.086957][T28696] RAX: ffffffffffffffda RBX: 00007fb93e79bf80 RCX: 00007fb93e689279 [ 1208.095043][T28696] RDX: 0000000000000080 RSI: 0000000020000440 RDI: 0000000000000005 [ 1208.103225][T28696] RBP: 00007fb93e6e32e9 R08: 0000000000000000 R09: 0000000000000000 [ 1208.111642][T28696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1208.120010][T28696] R13: 00007ffdcca3e16f R14: 00007fb93f849300 R15: 0000000000022000 [ 1208.128437][T28696] [ 1208.131517][T28696] Kernel panic - not syncing: panic_on_warn set ... [ 1208.138125][T28696] CPU: 0 PID: 28696 Comm: syz-executor.3 Not tainted 5.19.0-syzkaller-14074-g8cc61b7a6416 #0 [ 1208.148309][T28696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 1208.158392][T28696] Call Trace: [ 1208.161691][T28696] [ 1208.164640][T28696] dump_stack_lvl+0xcd/0x134 [ 1208.169271][T28696] panic+0x2c8/0x627 [ 1208.173226][T28696] ? panic_print_sys_info.part.0+0x10b/0x10b [ 1208.179259][T28696] ? __warn.cold+0x248/0x2c4 [ 1208.183889][T28696] ? bpf_check+0xb09a/0xb8e0 [ 1208.188524][T28696] __warn.cold+0x259/0x2c4 [ 1208.192970][T28696] ? __wake_up_klogd.part.0+0x99/0xf0 [ 1208.198370][T28696] ? bpf_check+0xb09a/0xb8e0 [ 1208.202996][T28696] report_bug+0x1bc/0x210 [ 1208.207385][T28696] handle_bug+0x3c/0x60 [ 1208.211571][T28696] exc_invalid_op+0x14/0x40 [ 1208.216106][T28696] asm_exc_invalid_op+0x16/0x20 [ 1208.220985][T28696] RIP: 0010:bpf_check+0xb09a/0xb8e0 [ 1208.226215][T28696] Code: e9 09 a1 ff ff 4c 89 ef e8 53 97 37 00 e9 8e 64 ff ff e8 f9 1c eb ff 48 c7 c7 40 89 f4 89 c6 05 d9 a3 38 0c 01 e8 93 f4 a8 07 <0f> 0b e9 51 a0 ff ff 4c 8b bd 88 fe ff ff e8 d3 1c eb ff 48 c7 c6 [ 1208.245956][T28696] RSP: 0018:ffffc9000361f8a0 EFLAGS: 00010282 [ 1208.252055][T28696] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000000 [ 1208.260048][T28696] RDX: 0000000000040000 RSI: ffffffff8161f148 RDI: fffff520006c3f06 [ 1208.268051][T28696] RBP: ffffc9000361fb00 R08: 0000000000000005 R09: 0000000000000000 [ 1208.276051][T28696] R10: 0000000080000000 R11: 0000000000000000 R12: ffff888047c0f000 [ 1208.284053][T28696] R13: dffffc0000000000 R14: ffffc900035dd060 R15: 0000000000000003 [ 1208.292066][T28696] ? vprintk+0x88/0x90 [ 1208.296232][T28696] ? bpf_get_btf_vmlinux+0x10/0x10 [ 1208.301388][T28696] ? lock_downgrade+0x6e0/0x6e0 [ 1208.306273][T28696] ? __might_fault+0xd1/0x170 [ 1208.311005][T28696] ? lock_downgrade+0x6e0/0x6e0 [ 1208.315946][T28696] ? ktime_get_with_offset+0x3f2/0x500 [ 1208.321405][T28696] ? memset+0x20/0x40 [ 1208.325381][T28696] ? bpf_obj_name_cpy+0x144/0x1a0 [ 1208.330403][T28696] bpf_prog_load+0x13cb/0x2230 [ 1208.335184][T28696] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 1208.341092][T28696] ? __might_fault+0xd1/0x170 [ 1208.345793][T28696] ? lock_downgrade+0x6e0/0x6e0 [ 1208.350779][T28696] ? security_bpf+0x83/0xb0 [ 1208.355308][T28696] __sys_bpf+0x1e3d/0x5f80 [ 1208.359756][T28696] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1208.365750][T28696] ? bpf_perf_link_attach+0x520/0x520 [ 1208.371149][T28696] ? find_held_lock+0x2d/0x110 [ 1208.375916][T28696] ? __ct_user_exit+0xff/0x150 [ 1208.380713][T28696] ? syscall_enter_from_user_mode+0x22/0xb0 [ 1208.386631][T28696] __x64_sys_bpf+0x75/0xb0 [ 1208.391055][T28696] ? syscall_enter_from_user_mode+0x22/0xb0 [ 1208.397148][T28696] do_syscall_64+0x35/0xb0 [ 1208.401563][T28696] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1208.407453][T28696] RIP: 0033:0x7fb93e689279 [ 1208.411862][T28696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1208.431476][T28696] RSP: 002b:00007fb93f849168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1208.439907][T28696] RAX: ffffffffffffffda RBX: 00007fb93e79bf80 RCX: 00007fb93e689279 [ 1208.447908][T28696] RDX: 0000000000000080 RSI: 0000000020000440 RDI: 0000000000000005 [ 1208.455887][T28696] RBP: 00007fb93e6e32e9 R08: 0000000000000000 R09: 0000000000000000 [ 1208.463874][T28696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1208.471933][T28696] R13: 00007ffdcca3e16f R14: 00007fb93f849300 R15: 0000000000022000 [ 1208.479910][T28696] [ 1208.483257][T28696] Kernel Offset: disabled [ 1208.487586][T28696] Rebooting in 86400 seconds..