)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:33:53 executing program 3: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'net_cls'}, {0x2b, 'freezer'}, {0x2d, 'devices'}, {0x2d, 'net'}]}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) write$cgroup_type(r1, &(0x7f00000000c0), 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000100)}, 0x10) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)={0x8}, 0x8) [ 1588.802622][ T144] device bridge_slave_1 left promiscuous mode [ 1588.822218][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 12:33:54 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002240)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004380)={r0, 0xe0, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000040c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000004100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000004140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000004180)=[{}, {}], 0x10, 0x10, &(0x7f00000041c0), &(0x7f0000004200), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000004240)}}, 0x10) [ 1589.402060][ T144] device bridge_slave_0 left promiscuous mode [ 1589.409906][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 12:33:55 executing program 3: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:33:55 executing program 1: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'net_cls'}, {0x2b, 'freezer'}, {0x2d, 'devices'}, {0x2d, 'net'}]}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) write$cgroup_type(r1, &(0x7f00000000c0), 0x9) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)={0x8}, 0x8) [ 1591.334740][ T144] device hsr_slave_0 left promiscuous mode [ 1592.113838][ T144] device hsr_slave_1 left promiscuous mode [ 1592.704989][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1593.146591][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1593.454373][ T144] device bridge_slave_1 left promiscuous mode [ 1593.460711][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1594.139379][ T144] device bridge_slave_0 left promiscuous mode [ 1594.163803][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1595.725922][ T144] device hsr_slave_0 left promiscuous mode [ 1596.473889][ T144] device hsr_slave_1 left promiscuous mode [ 1597.272095][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1597.288364][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1597.836006][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1597.843504][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1598.240211][ T144] device bridge_slave_1 left promiscuous mode [ 1598.268343][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1598.734202][ T144] device bridge_slave_0 left promiscuous mode [ 1598.740642][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1600.487413][ T144] device hsr_slave_0 left promiscuous mode [ 1600.960708][ T144] device hsr_slave_1 left promiscuous mode [ 1601.549824][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1601.974652][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1602.313149][ T144] device bridge_slave_1 left promiscuous mode [ 1602.337370][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1602.904183][ T144] device bridge_slave_0 left promiscuous mode [ 1602.911863][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 12:34:08 executing program 4: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'net_cls'}, {0x2b, 'freezer'}, {0x2d, 'devices'}, {0x2d, 'net'}]}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)={0x8}, 0x8) 12:34:08 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002240)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004380)={r0, 0xe0, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000040c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000004100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000004140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000004180)=[{}, {}], 0x10, 0x10, &(0x7f00000041c0), &(0x7f0000004200), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000004240)}}, 0x10) [ 1604.133920][ T8716] Bluetooth: hci6: command 0x0406 tx timeout [ 1604.143684][ T6906] Bluetooth: hci0: command 0x0406 tx timeout [ 1604.487452][ T144] device hsr_slave_0 left promiscuous mode [ 1604.887711][ T144] device hsr_slave_1 left promiscuous mode [ 1605.506119][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1605.520883][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1605.784612][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1605.792122][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1606.176109][ T144] device bridge_slave_1 left promiscuous mode [ 1606.182368][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1606.639592][ T144] device bridge_slave_0 left promiscuous mode [ 1606.652374][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 1607.176623][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1607.182959][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 [ 1607.423699][T12502] Bluetooth: hci3: command 0x0409 tx timeout 12:34:13 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004380)={0xffffffffffffffff, 0xe0, &(0x7f0000004280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000040c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x7, &(0x7f0000004100)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000004140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x3d, &(0x7f0000004180)=[{}, {}], 0x10, 0x10, &(0x7f00000041c0), &(0x7f0000004200), 0x8, 0xfc, 0x8, 0x8, &(0x7f0000004240)}}, 0x10) 12:34:13 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:13 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x7a, 0xbe, 0x1f, 0x7f, 0x0, 0x4b, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:13 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1608.399043][ T144] device hsr_slave_0 left promiscuous mode 12:34:13 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:13 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:14 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0xbe, 0x1f, 0x7f, 0x0, 0x4b, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:14 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1609.101649][ T144] device hsr_slave_1 left promiscuous mode 12:34:14 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1609.503725][T12502] Bluetooth: hci3: command 0x041b tx timeout 12:34:14 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x1f, 0x7f, 0x0, 0x4b, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1609.704064][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1609.712177][ T144] batman_adv: batadv0: Removing interface: batadv_slave_0 12:34:15 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1610.356115][ T144] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1610.383861][ T144] batman_adv: batadv0: Removing interface: batadv_slave_1 12:34:15 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1610.552324][ T144] device bridge_slave_1 left promiscuous mode [ 1610.564607][ T144] bridge0: port 2(bridge_slave_1) entered disabled state 12:34:15 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4b, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1610.599080][ T144] device bridge_slave_0 left promiscuous mode [ 1610.620131][ T144] bridge0: port 1(bridge_slave_0) entered disabled state 12:34:15 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1611.583728][T12502] Bluetooth: hci3: command 0x040f tx timeout [ 1611.593388][ T144] device veth1_macvtap left promiscuous mode [ 1611.633241][ T144] device veth0_macvtap left promiscuous mode [ 1611.649233][ T144] device veth1_vlan left promiscuous mode [ 1611.683799][ T144] device veth0_vlan left promiscuous mode 12:34:16 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:17 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:17 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1611.922929][ T144] device veth1_vlan left promiscuous mode [ 1611.929949][ T144] device veth0_vlan left promiscuous mode [ 1612.135083][ T6906] Bluetooth: hci4: command 0x0409 tx timeout 12:34:17 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0, &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:18 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:18 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:18 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1613.663969][ T8716] Bluetooth: hci3: command 0x0419 tx timeout 12:34:19 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:19 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1614.213936][ T8714] Bluetooth: hci4: command 0x041b tx timeout [ 1614.716540][ T144] device veth1_macvtap left promiscuous mode [ 1614.722751][ T144] device veth0_macvtap left promiscuous mode [ 1614.753895][ T144] device veth1_vlan left promiscuous mode [ 1614.759778][ T144] device veth0_vlan left promiscuous mode 12:34:19 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:19 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x0, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:20 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:20 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:20 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1616.293837][T17315] Bluetooth: hci4: command 0x040f tx timeout 12:34:21 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x0, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:21 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:21 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:22 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1617.417831][ T144] device veth1_macvtap left promiscuous mode [ 1617.424764][ T144] device veth0_macvtap left promiscuous mode [ 1617.433865][ T144] device veth1_vlan left promiscuous mode [ 1617.439720][ T144] device veth0_vlan left promiscuous mode 12:34:22 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x0, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:23 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:23 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1618.373830][ T8714] Bluetooth: hci4: command 0x0419 tx timeout 12:34:23 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:24 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:24 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:24 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:25 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:25 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:25 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:26 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:27 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:27 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:27 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:27 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:28 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:29 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:29 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:29 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:30 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:30 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:31 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:31 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:31 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:31 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:31 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:32 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:32 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x0, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:33 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:33 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:33 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:34 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x0, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:34 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:34 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1629.733874][T17446] Bluetooth: hci1: command 0x0406 tx timeout 12:34:35 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:36 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x0, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:36 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:36 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:37 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:37 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x0, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:37 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:38 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:38 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:38 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:39 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x0, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:40 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:40 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:40 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:41 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x0, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:41 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:42 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:42 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:42 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x0, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:43 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:44 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:44 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:44 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x0, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:46 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:46 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:46 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x0, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:46 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:47 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:47 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:48 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:48 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:48 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:49 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:50 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:50 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:51 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:51 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:51 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:52 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:53 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:53 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:53 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:54 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:54 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:55 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:56 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:56 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:56 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:57 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:34:57 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:57 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:34:58 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:34:58 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:00 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], 0x0, 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:00 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:01 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:01 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480), 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:01 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:02 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:03 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:03 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480), 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:03 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:04 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:04 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:05 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480), 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:05 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:06 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:06 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:06 executing program 1: getpid() r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000005c0)='syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:07 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x0, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:07 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:08 executing program 3: getpid() r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000005c0)='syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:08 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:09 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:09 executing program 2: getpid() r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r1, &(0x7f00000005c0)='syz0\x00', 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r0}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:10 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x0, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:10 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:11 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:12 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:12 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:12 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:13 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x0, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:13 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1668.630308][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.636694][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 12:35:14 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], 0x0, 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:14 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:15 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:15 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:15 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:16 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:16 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:16 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:17 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:17 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:17 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:18 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1673.823630][T12502] Bluetooth: hci5: command 0x0409 tx timeout 12:35:19 executing program 3: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:19 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:19 executing program 1: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:20 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1675.893638][T12919] Bluetooth: hci5: command 0x041b tx timeout 12:35:21 executing program 1: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) 12:35:21 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1676.159337][ T144] team0 (unregistering): Port device team_slave_1 removed [ 1676.434902][ T144] team0 (unregistering): Port device team_slave_0 removed [ 1676.702911][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 12:35:22 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1676.973746][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1677.983669][T12502] Bluetooth: hci5: command 0x040f tx timeout 12:35:23 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x0, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:23 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1680.053752][T17315] Bluetooth: hci5: command 0x0419 tx timeout [ 1680.063637][T12919] Bluetooth: hci7: command 0x0409 tx timeout 12:35:25 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:25 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x0, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1681.238398][ T144] bond0 (unregistering): Released all slaves 12:35:26 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1682.143653][T12919] Bluetooth: hci7: command 0x041b tx timeout 12:35:27 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r2, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:27 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x0, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1684.223680][T17446] Bluetooth: hci7: command 0x040f tx timeout 12:35:29 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:29 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz0\x00', 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:31 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:31 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1686.303757][T12919] Bluetooth: hci7: command 0x0419 tx timeout 12:35:32 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:32 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:34 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:34 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:35 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1691.036235][ T144] team0 (unregistering): Port device team_slave_1 removed [ 1691.792182][ T144] team0 (unregistering): Port device team_slave_0 removed 12:35:37 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:37 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1692.824876][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface 12:35:38 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}]}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:39 executing program 3: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1694.089765][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:35:40 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:40 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}]}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:42 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:43 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:44 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}]}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:44 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:44 executing program 3: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={0x0, 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1699.447179][ T144] bond0 (unregistering): Released all slaves 12:35:44 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f00000005c0)='syz0\x00', 0x1ff) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r2, 0x0, &(0x7f0000000c40)=[r8, r9], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r6, r10, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r5, r12}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r3, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r13 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r13, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r14, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, r15, 0x2, 0x4, 0x4, 0x4}, 0x48) r17 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r17, 0x40042408, r2) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r7, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r6, 0x0, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r11], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r13, 0x89e0, &(0x7f00000018c0)={r13, r10}) r19 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r19}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r11}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r6, 0x25, r18, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:47 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:51 executing program 1: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x0, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x0, 0xc94e, 0x0, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x0, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f00000008c0), 0x0, 0x0, 0x19, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, 0xffffffffffffffff, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r11}, 0x20) openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r12 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r12, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r13, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x4, 0x4}, 0x48) r15 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r15, 0x40042408, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r14}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r10], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r12, 0x89e0, &(0x7f00000018c0)={r12}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:51 executing program 3: r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2b, 'net_cls'}, {0x2b, 'freezer'}, {0x2d, 'devices'}, {0x2d, 'net'}]}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x0, 0x0) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) write$cgroup_type(r1, &(0x7f00000000c0), 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r1, 0x58, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={@ifindex=r2, 0x1e, 0x1, 0x6, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r4 = perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x80, 0x7a, 0xbe, 0x1f, 0x7f, 0x0, 0x4b, 0xc00, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_config_ext={0x1ff, 0x80000001}, 0x100, 0x2, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, r1, 0x4, r1, 0x4) openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000003c0)={0x8}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r1, &(0x7f0000000400)="e5edc772ed1519deadaa2648c92095c251b3cec6d9fd5b7baedaee9168a866487d9f2d5b687b953f185a8544a6abe5ae", &(0x7f0000000440)=""/75}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000700)={&(0x7f0000000500)="44004f6f9765d8906f41e3e562ab570c615a04c20dc3b3122e184b8648ec6bad47e2dde19a4e3070f89335bf46b65029e847f9180bf7914a3bfa000146eea9badbcca9ac7fa0d25648b4efb9e1f8cc6575d47adf2469d4b4d79440e1c6f560a81c77479114414a0d9106c0a02c69816b8c7f086bab412d39b73790e58c22ce05afe711a4816bba2dd57af1f09ebb14cf5fbd2108c03d9ec9dab1b20ef3120606833da10d7871", &(0x7f00000005c0)=""/45, &(0x7f0000000600)="8e68a8ee8ff07c6a2d169cb8731fdca90d9cbb05a94d7a06fdc36e9b4ada589ae50b5e56e480f264241b39f61d5fa2663375b6a09ba1e0c87f68bb5c57c3537b6a5800dc6c00686170e07448aaa0dd81d15146b662d13f4e40f2beb6895b0825ad7e7af96c5eab427082196acbb56b72e4030eb2eb95dd694fee559988ddf12f1fab9ea2dca413dd5eca3855b76431c90b24d7c4a0034478edb50e583c13d0062bfdd9262683", &(0x7f00000006c0)="9da9a8d1ccd2027cfe93a81371cee0aada5601dd3d4e9736b74d59bfa37c1011805076439f0981", 0x5, r1}, 0x38) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x10001, '\x00', 0x0, r1, 0x1, 0x2}, 0x48) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000007c0)=r1) r6 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000800)=0xffffffffffffffff, 0x4) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000940)={@cgroup=0xffffffffffffffff, 0xc, 0x0, 0x7ff, &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0], 0x4, 0x0, &(0x7f0000000880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000008c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000980)={@ifindex=r3, r1, 0x1c, 0x202c, r1, @link_fd=r6, r8}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a40)={{r1}, &(0x7f00000009c0), &(0x7f0000000a00)=r1}, 0x20) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000a80), 0x2000, 0x0) ioctl$TUNSETPERSIST(r9, 0x400454cb, 0x0) r10 = openat$cgroup_int(r7, &(0x7f0000000ac0)='cpu.max.burst\x00', 0x2, 0x0) ioctl$TUNSETLINK(r9, 0x400454cd, 0x30c) r11 = bpf$ITER_CREATE(0x21, &(0x7f0000000b00), 0x8) ioctl$TUNSETQUEUE(r11, 0x400454d9, &(0x7f0000000b40)={'veth0_to_bridge\x00'}) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000c80)={@ifindex=r3, 0x0, 0x1, 0x513, &(0x7f0000000b80), 0x0, 0x0, &(0x7f0000000bc0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000c00)=[0x0, 0x0], &(0x7f0000000c40)=[0x0, 0x0, 0x0]}, 0x40) r12 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000cc0)={0x1b, 0x0, 0x0, 0x6, 0x0, r5, 0x6ef, '\x00', r2, r1, 0x5, 0x3, 0x3}, 0x48) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=@bloom_filter={0x1e, 0x81d, 0x80, 0x8, 0x1082, r12, 0xbc, '\x00', r3, r1, 0x4, 0x0, 0x2, 0x4}, 0x48) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0xfffffffffffffffc, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000fc0)={r14, 0xffffffffffffffff}, 0x4) sendmsg$unix(r11, &(0x7f0000001300)={&(0x7f0000000dc0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000f80)=[{&(0x7f0000000e40)="86f90a641b86da486ca8ea7b721764211493270ac9cc09ae05e6c8dd3c0167d58f4aa9da48d39a1c8f7fa79430dc690e2f0d2e5da965070160152369ab80872cfb9c2e0d4d4f5c4fc2eda3dc5a57721461c7af7b776b7651543bd26b40498cefc7a3c82e36cf6acc0c705210930b259b226190f88bdf35f991cae3c4e1545c796b1d91e001e2cdff579a19316ed5455f029b5eeee744b59e23e207aa3dc8f5adbb", 0xa1}, {&(0x7f0000000f00)="49cbdfa5ee27691b90e45c538c56c6d37bb50a62e89badf3e9de626e44a184925a78e3109da07e288e57bdab61f27f28908425dff76f083767f5528566fbdd8c50ef42792eae0485d18603bc236ac72861612e8748cb780807beb28ec07753da15cdecb1d1ef9b94033b74bd", 0x6c}], 0x2, &(0x7f0000001200)=[@rights={{0x20, 0x1, 0x1, [r10, r15, r7, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r13, r4, r9, r4]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r5, r9, 0xffffffffffffffff, r5]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r5, r1]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0xd0, 0x20000004}, 0x24000814) 12:35:51 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f00000005c0)='syz0\x00', 0x1ff) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r2, 0x0, &(0x7f0000000c40)=[r8, r9], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r6, r10, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r5, r12}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r3, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r13 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r13, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r14, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, r15, 0x2, 0x4, 0x4, 0x4}, 0x48) r17 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r17, 0x40042408, r2) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r7, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r6, 0x0, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r11], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r13, 0x89e0, &(0x7f00000018c0)={r13, r10}) r19 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r19}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r11}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r6, 0x25, r18, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:35:53 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={0x0, 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:35:54 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r3, &(0x7f00000005c0)='syz0\x00', 0x1ff) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r2, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r9 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r10 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r2, 0x0, &(0x7f0000000c40)=[r8, r9], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r9, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r6, r10, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r5, r12}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r3, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r13 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r13, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r14, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r15 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r16 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r8, 0x200, '\x00', 0x0, r15, 0x2, 0x4, 0x4, 0x4}, 0x48) r17 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r17, 0x40042408, r2) r18 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r7, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r16}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r6, 0x0, r18, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r11], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r13, 0x89e0, &(0x7f00000018c0)={r13, r10}) r19 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r19}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r11}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r6, 0x25, r18, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1710.453628][ T8714] Bluetooth: hci8: command 0x0409 tx timeout 12:35:56 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={0x0, 0x0, 0x4000, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1710.917648][ T144] team0 (unregistering): Port device team_slave_1 removed [ 1710.941548][ T144] team0 (unregistering): Port device team_slave_0 removed [ 1710.962182][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1711.114208][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1712.533633][ T3591] Bluetooth: hci8: command 0x041b tx timeout 12:35:58 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1714.613730][ T3591] Bluetooth: hci8: command 0x040f tx timeout 12:36:00 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:36:01 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1716.044238][ T144] bond0 (unregistering): Released all slaves [ 1716.693628][ T8714] Bluetooth: hci8: command 0x0419 tx timeout 12:36:03 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:36:04 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:36:06 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x0, r1}, 0x18) r5 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r3, r4], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r5, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r6 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r6, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r7 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r7, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r6, 0x89e0, &(0x7f00000018c0)={r6, r5}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1721.132013][ T144] team0 (unregistering): Port device team_slave_1 removed [ 1721.150114][ T144] team0 (unregistering): Port device team_slave_0 removed [ 1721.185415][ T144] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1722.360324][ T144] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 12:36:08 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) 12:36:10 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:36:11 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1727.326030][ T144] bond0 (unregistering): Released all slaves 12:36:12 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) 12:36:14 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1730.056960][ T1377] ieee802154 phy0 wpan0: encryption failed: -22 [ 1730.063283][ T1377] ieee802154 phy1 wpan1: encryption failed: -22 12:36:15 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000}, 0x18) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', 0x0, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, 0xffffffffffffffff, 0x0, &(0x7f0000000c40)=[r2, r3], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r4, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r1, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r5 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r5, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r5, 0x89e0, &(0x7f00000018c0)={r5, r4}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1731.333822][ T26] INFO: task kworker/0:6:3563 blocked for more than 143 seconds. [ 1731.341834][ T26] Not tainted 5.15.152-syzkaller #0 [ 1731.379392][ T26] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1731.417464][ T26] task:kworker/0:6 state:D stack:23896 pid: 3563 ppid: 2 flags:0x00004000 [ 1731.463876][ T26] Workqueue: events linkwatch_event [ 1731.469279][ T26] Call Trace: [ 1731.472583][ T26] [ 1731.503671][ T26] __schedule+0x12c4/0x45b0 [ 1731.508363][ T26] ? mark_lock+0x98/0x340 [ 1731.512763][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1731.560636][ T26] ? __sched_text_start+0x8/0x8 [ 1731.576778][ T26] ? __mutex_trylock_common+0x8d/0x2e0 [ 1731.613744][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1731.623913][ T26] ? _raw_spin_unlock_irq+0x1f/0x40 [ 1731.629217][ T26] ? lockdep_hardirqs_on+0x94/0x130 [ 1731.658853][ T26] schedule+0x11b/0x1f0 [ 1731.668067][ T26] schedule_preempt_disabled+0xf/0x20 [ 1731.715272][ T26] __mutex_lock_common+0xe34/0x25a0 [ 1731.743600][ T26] ? linkwatch_event+0xa/0x50 [ 1731.748340][ T26] ? mutex_lock_io_nested+0x60/0x60 [ 1731.766181][ T26] ? lockdep_hardirqs_on_prepare+0x438/0x7a0 [ 1731.793672][ T26] ? print_irqtrace_events+0x210/0x210 [ 1731.799200][ T26] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1731.843733][ T26] ? do_raw_spin_unlock+0x137/0x8b0 [ 1731.849007][ T26] mutex_lock_nested+0x17/0x20 [ 1731.887641][ T26] linkwatch_event+0xa/0x50 [ 1731.892209][ T26] process_one_work+0x8a1/0x10c0 [ 1731.919219][ T26] ? worker_detach_from_pool+0x260/0x260 [ 1731.950997][ T26] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1731.989765][ T26] ? kthread_data+0x4e/0xc0 [ 1732.003656][ T26] ? wq_worker_running+0x97/0x170 [ 1732.008751][ T26] worker_thread+0xaca/0x1280 [ 1732.051811][ T26] kthread+0x3f6/0x4f0 [ 1732.059900][ T26] ? rcu_lock_release+0x20/0x20 [ 1732.066971][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1732.103625][ T26] ret_from_fork+0x1f/0x30 [ 1732.108201][ T26] [ 1732.111365][ T26] [ 1732.111365][ T26] Showing all locks held in the system: [ 1732.143734][T12502] Bluetooth: hci3: command 0x0406 tx timeout [ 1732.165209][ T26] 1 lock held by khungtaskd/26: [ 1732.180125][ T26] #0: ffffffff8c91f720 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x0/0x30 [ 1732.205002][ T26] 5 locks held by kworker/u4:1/144: [ 1732.226262][ T26] #0: ffff888011dcd138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1732.263631][ T26] #1: ffffc900010bfd20 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1732.299107][ T26] #2: ffffffff8d9cfe50 (pernet_ops_rwsem){++++}-{3:3}, at: cleanup_net+0xf1/0xb60 [ 1732.343593][ T26] #3: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: default_device_exit_batch+0x1ac/0x3f0 [ 1732.373997][ T26] #4: ffffffff8c923ce8 (rcu_state.exp_mutex){+.+.}-{3:3}, at: synchronize_rcu_expedited+0x280/0x740 12:36:17 executing program 2: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1732.417848][ T26] 3 locks held by kworker/1:2/1064: [ 1732.437015][ T26] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1732.501540][ T26] #1: ffffc90004e37d20 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1732.553601][ T26] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: switchdev_deferred_process_work+0xa/0x20 [ 1732.582886][ T26] 3 locks held by kworker/u4:3/1087: [ 1732.618714][ T26] 2 locks held by getty/3262: [ 1732.633630][ T26] #0: ffff88807f039098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 1732.657330][ T26] #1: ffffc90002bab2e8 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0x6af/0x1db0 [ 1732.687983][ T26] 3 locks held by kworker/1:5/3559: [ 1732.723682][ T26] #0: ffff888011c71938 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1732.765866][ T26] #1: ffffc90002f87d20 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1732.823674][ T26] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: reg_check_chans_work+0x7f/0xb70 [ 1732.833425][ T26] 3 locks held by kworker/0:6/3563: [ 1732.868934][ T26] #0: ffff888011c70938 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1732.911283][ T26] #1: ffffc90002fc7d20 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1732.957096][ T26] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: linkwatch_event+0xa/0x50 [ 1733.003598][ T26] 4 locks held by kworker/u4:5/3593: [ 1733.008936][ T26] #0: ffff8881425ba138 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1733.053626][ T26] #1: ffffc90003097d20 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1733.103176][ T26] #2: ffff88807f0c6bd8 (&sbi->s_writepages_rwsem){.+.+}-{0:0}, at: ext4_writepages+0x1f6/0x3d10 [ 1733.136183][ T26] #3: ffff88807f0d0990 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x12b9/0x1570 [ 1733.175364][ T26] 3 locks held by kworker/1:10/8716: [ 1733.180850][ T26] #0: ffff888023cc0138 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1733.249934][ T26] #1: ffffc9000456fd20 ((addr_chk_work).work){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1733.283653][ T26] #2: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: addrconf_verify_work+0xa/0x20 [ 1733.293259][ T26] 2 locks held by kworker/0:3/17446: [ 1733.338186][ T26] #0: ffff888011c72138 ((wq_completion)rcu_gp){+.+.}-{0:0}, at: process_one_work+0x78a/0x10c0 [ 1733.383862][ T26] #1: ffffc900032b7d20 ((work_completion)(&rew.rew_work)){+.+.}-{0:0}, at: process_one_work+0x7d0/0x10c0 [ 1733.423197][ T26] 2 locks held by syz-executor.3/17940: [ 1733.445664][ T26] 3 locks held by syz-executor.3/17946: [ 1733.473675][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1733.516353][ T26] #1: ffff888056c635c8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1733.566380][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1733.604907][ T26] 3 locks held by syz-executor.2/18011: [ 1733.610527][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1733.661144][ T26] #1: ffff88803d125da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1733.720508][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1733.763739][ T26] 3 locks held by syz-executor.2/18033: [ 1733.769350][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1733.835907][ T26] #1: ffff888056c67198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1733.890354][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1733.925988][ T26] 3 locks held by syz-executor.1/18040: [ 1733.931586][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1733.977386][ T26] #1: ffff88806f4e5da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.029339][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1734.074288][ T26] 3 locks held by syz-executor.2/18052: [ 1734.097342][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1734.123645][ T26] #1: ffff88803d1117e0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.185435][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1734.218785][ T26] 3 locks held by syz-executor.1/18058: [ 1734.253803][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1734.284777][ T26] #1: ffff888042c253b0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.325538][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1734.365673][ T26] 3 locks held by syz-executor.1/18090: [ 1734.371263][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1734.420781][ T26] #1: ffff88803a2a2bd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.464886][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1734.503706][ T26] 3 locks held by syz-executor.0/18103: [ 1734.530304][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1734.559499][ T26] #1: ffff888059975da8 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.607141][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1734.651836][ T26] 3 locks held by syz-executor.1/18118: [ 1734.691220][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1734.714022][ T26] #1: ffff88803a2a7198 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.756046][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 12:36:19 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc67, 0x1, @perf_config_ext={0x0, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x0, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r2 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, 0x0, 0x1ff) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex, r3, 0x2f, 0x0, 0xffffffffffffffff, @prog_id}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r2, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r4 = socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(r4, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[0xffffffffffffffff], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000018c0)={r4, r3}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) [ 1734.805884][ T26] 3 locks held by syz-executor.0/18126: [ 1734.823628][ T26] #0: ffff88807f0c4460 (sb_writers#5){.+.+}-{0:0}, at: do_coredump+0x1825/0x31e0 [ 1734.832955][ T26] #1: ffff88803a0f2bd0 (&sb->s_type->i_mutex_key#9){++++}-{3:3}, at: ext4_buffered_write_iter+0xa0/0x360 [ 1734.963725][ T26] #2: ffff88807f0c40e0 (&type->s_umount_key#32){++++}-{3:3}, at: try_to_writeback_inodes_sb+0x1d/0xb0 [ 1735.012782][ T26] 2 locks held by syz-executor.2/18188: [ 1735.021985][ T26] 1 lock held by syz-executor.1/18198: [ 1735.051271][ T26] 1 lock held by syz-executor.0/18208: [ 1735.073652][ T26] 1 lock held by syz-executor.1/18222: [ 1735.079158][ T26] 1 lock held by syz-executor.0/18232: [ 1735.104426][ T26] 1 lock held by syz-executor.2/18240: [ 1735.130232][ T26] 1 lock held by syz-executor.1/18247: [ 1735.153645][ T26] 2 locks held by syz-executor.0/18260: [ 1735.159276][ T26] 1 lock held by syz-executor.1/18263: [ 1735.227426][ T26] 2 locks held by syz-executor.4/18270: [ 1735.266479][ T26] 1 lock held by syz-executor.0/18279: [ 1735.272017][ T26] 3 locks held by syz-executor.2/18284: [ 1735.333650][ T26] 2 locks held by syz-executor.1/18318: [ 1735.339261][ T26] 2 locks held by syz-executor.2/18333: [ 1735.393583][ T26] 2 locks held by syz-executor.2/18394: [ 1735.399178][ T26] 1 lock held by syz-executor.2/18417: [ 1735.460707][ T26] 1 lock held by syz-executor.2/18443: [ 1735.473570][ T26] 1 lock held by syz-executor.1/18450: [ 1735.479075][ T26] 1 lock held by syz-executor.4/18929: [ 1735.518099][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1735.576991][ T26] 1 lock held by syz-executor.0/18956: [ 1735.603323][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1735.663666][ T26] 1 lock held by syz-executor.2/19207: [ 1735.673938][ T26] 2 locks held by syz-executor.3/19242: [ 1735.713564][ T26] 1 lock held by syz-executor.1/19289: [ 1735.724028][ T26] 1 lock held by syz-executor.2/19326: [ 1735.729514][ T26] 1 lock held by syz-executor.2/19342: [ 1735.778321][ T26] 1 lock held by syz-executor.2/19360: [ 1735.797280][ T26] 3 locks held by syz-executor.2/19392: [ 1735.823621][ T26] 1 lock held by syz-executor.4/19447: [ 1735.829135][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1735.903737][ T26] 1 lock held by syz-executor.0/19488: [ 1735.911441][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1735.958646][ T26] 3 locks held by syz-executor.2/19608: [ 1735.984943][ T26] 1 lock held by syz-executor.3/19613: [ 1735.990440][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x460/0x2270 12:36:21 executing program 3: syz_clone(0x10002000, &(0x7f0000000000)="8e21613bf08bb6f7ea3ccecbecf21f2daebf7b6f18e004641f862f83236bd8e3119652df490c", 0x26, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="edc85a968c7c4a10aca837866b5b2b6ca098bcf45fda1ff770ff9009c878bccd4e5cdb4b0682b9b4b60a833a79c1da54d1d7a462e20575b6920493691c4697d4ad6d0e6288a978c84471ebdf689e779d2cc76708a900495153c391e784c94d019d8c57e4e023073c6655dbfc7552955faf73afdd81d7b75eb4bbee0a7f") r0 = getpid() r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1f, 0x5, 0x2, 0x0, 0x0, 0x81, 0x10, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc67, 0x1, @perf_config_ext={0x7fffffff, 0xdb}, 0x800, 0x6, 0x1, 0x0, 0x7, 0x1, 0x6, 0x0, 0x5}, r0, 0xf, 0xffffffffffffffff, 0x5) r2 = perf_event_open$cgroup(&(0x7f0000000200)={0x1, 0x80, 0x6d, 0x20, 0x3, 0x5, 0x0, 0x2d, 0x1000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x1800, 0xc94e, 0xffffffff, 0x0, 0x4, 0x10000, 0x4, 0x0, 0x5, 0x0, 0x94c2}, 0xffffffffffffffff, 0x8, r1, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xf, 0xc, &(0x7f0000000280)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffe00}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], &(0x7f0000000300)='GPL\x00', 0x1, 0x4d, &(0x7f0000000340)=""/77, 0x41100, 0x5, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x9, 0x8001}, 0x8, 0x10, &(0x7f0000000400)={0x3, 0xa, 0x9, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000000440)=[r1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000480)=[{0x1, 0x5, 0x9, 0xc}], 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000005c0)='syz0\x00', 0x1ff) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)=@o_path={&(0x7f0000000600)='./file0\x00', 0x0, 0x18, r1}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={r3, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000007c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000800)=[0x0, 0x0, 0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb4, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0x19, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000b40)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x2}, 0x48) r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000c00)=@o_path={&(0x7f0000000bc0)='./file0\x00', 0x0, 0x4000, r1}, 0x18) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_tracing={0x1a, 0x11, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xb95, 0x0, 0x0, 0x0, 0x2}, [@map_idx={0x18, 0x0, 0x5, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x9}]}, &(0x7f0000000740)='syzkaller\x00', 0x2, 0x25, &(0x7f0000000780)=""/37, 0x40f00, 0x29, '\x00', r7, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000b00)={0x5, 0x9, 0x1f, 0x9}, 0x10, 0x177bc, r3, 0x0, &(0x7f0000000c40)=[r9, r10], 0x0, 0x10, 0xa1}, 0x90) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000e40)={@map=r10, 0xb, 0x0, 0x1000000, &(0x7f0000000d40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000dc0)=[0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000e80)={@ifindex=r7, r11, 0x2f, 0x0, 0xffffffffffffffff, @prog_id=r6, r13}, 0x20) syz_open_procfs$namespace(0x0, &(0x7f0000000ec0)='ns/time_for_children\x00') openat$cgroup(r4, &(0x7f0000000f00)='syz0\x00', 0x200002, 0x0) r14 = socket$kcm(0x29, 0x7, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(r14, &(0x7f00000011c0)={&(0x7f0000000f80)=@pppol2tpin6={0x18, 0x1, {0x0, r15, 0x2, 0x1, 0x2, 0x1, {0xa, 0x4e22, 0x4, @local, 0x2}}}, 0x80, &(0x7f0000001140)=[{&(0x7f0000001000)="adf60975837d6f7fd4a9af8db6dd494c84ae85311bc3b463f589f2aa3b66dd7ea1174447df48132819d765297a92e16826bbb2c89794db1e4b200520ae1c73", 0x3f}, {&(0x7f0000001040)="64d100072b71dc990ba73fbce1a7957205296eb915f476729e3cae0f893f8559833de23cdfc19d243c245a415f52160d8f70e1f61aa22590a0fb597024d0d3fad2567ae39ca2f888d34638e3aa2e2aca2a2c0f293ad745607fe29965a460a5186165ffedab241543", 0x68}, {&(0x7f00000010c0)="a19162c0ef6cf86cde2e3483a70fc2adfd72d60de1e12337847f33f501b99d4d80", 0x21}, {&(0x7f0000001100)="96eec9313e5c66c298227d9023ce9885216722efed942a1a9fc7", 0x1a}], 0x4, &(0x7f0000001180)}, 0xc800) r16 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11a, 0x11a, 0x6, [@fwd={0xe}, @enum={0x9, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x8}, {0xb, 0x5}, {0x6, 0x9}, {0xd, 0x3}]}, @volatile={0x3}, @const={0x8, 0x0, 0x0, 0xa, 0x5}, @enum={0xc, 0x5, 0x0, 0x6, 0x4, [{0x1, 0xffff}, {0xb, 0x5}, {0x0, 0x2f4}, {0xc, 0x40}, {0x4, 0xc0}]}, @datasec={0x5, 0xa, 0x0, 0xf, 0x2, [{0x3, 0x4b18d9fb, 0xfffff25e}, {0x2, 0x2ef, 0x69}, {0x3, 0x975, 0x8}, {0x3, 0x200}, {0x3, 0x7, 0x5}, {0x5, 0x2, 0x1}, {0x3, 0x2, 0x6}, {0x4, 0x8f53, 0x1}, {0x3, 0x3, 0x80}, {0x1, 0x0, 0x8}], "4b02"}, @var={0x2, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x30, 0x61, 0x0]}}, &(0x7f0000001340)=""/210, 0x13a, 0xd2, 0x0, 0x97f}, 0x20) r17 = bpf$MAP_CREATE(0x0, &(0x7f0000001480)=@bloom_filter={0x1e, 0x7, 0x9, 0x0, 0x108, r9, 0x200, '\x00', 0x0, r16, 0x2, 0x4, 0x4, 0x4}, 0x48) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='rxrpc_client\x00'}, 0x10) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r18, 0x40042408, r3) r19 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001700)=r8, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001800)={0x11, 0x15, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xdc}, {{0x18, 0x1, 0x1, 0x0, r17}}, {}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0x20, 0x1}, @ldst={0x0, 0x3, 0x1, 0x6, 0x4, 0xfffffffffffffffe, 0xfffffffffffffffc}, @ldst={0x0, 0x0, 0x6, 0x7, 0x4, 0x6, 0x8}, @map_val={0x18, 0xa, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xfffffffd}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001640)='syzkaller\x00', 0x9, 0x6e, &(0x7f0000001680)=""/110, 0x41000, 0x6f, '\x00', r7, 0x0, r19, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001740)={0x4, 0x5, 0x9, 0x3}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001780)=[r12], &(0x7f00000017c0)=[{0x4, 0x3, 0xb, 0xc}, {0x2, 0x5, 0x8, 0x1}], 0x10, 0x4}, 0x90) ioctl$sock_kcm_SIOCKCMATTACH(r14, 0x89e0, &(0x7f00000018c0)={r14, r11}) r20 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001900)='pids.current\x00', 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002b00)={0x6, 0x18, &(0x7f0000001940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xa0000, 0x0, 0x0, 0x0, 0x7ff}, {{0x18, 0x1, 0x1, 0x0, r20}}, {}, [@cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffd}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffc}, @exit, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x2, 0x1, 0x0, r12}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001a00)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000001a40)=""/4096, 0x41000, 0x22, '\x00', r7, 0x25, r19, 0x8, &(0x7f0000002a40)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000002a80)={0x2, 0xd, 0x1b, 0x800}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000002ac0)=[{0x0, 0x4, 0x4, 0x9}], 0x10, 0x9}, 0x90) [ 1736.035985][ T26] 1 lock held by syz-executor.3/19617: [ 1736.041495][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: __tun_chr_ioctl+0x460/0x2270 [ 1736.163140][ T26] 2 locks held by syz-executor.2/19616: [ 1736.203617][ T26] 1 lock held by syz-executor.1/19621: [ 1736.209123][ T26] #0: ffffffff8d9dba08 (rtnl_mutex){+.+.}-{3:3}, at: rtnetlink_rcv_msg+0x94c/0xee0 [ 1736.300427][ T26] 3 locks held by syz-executor.2/19628: [ 1736.323582][ T26] 2 locks held by syz-executor.2/19634: [ 1736.329304][ T26] 2 locks held by syz-executor.2/19639: [ 1736.404064][ T26] 2 locks held by syz-executor.2/19647: [ 1736.443757][ T26] 2 locks held by syz-executor.2/19654: [ 1736.449356][ T26] 2 locks held by syz-executor.2/19659: [ 1736.503612][ T26] 2 locks held by syz-executor.2/19665: [ 1736.509212][ T26] 2 locks held by syz-executor.2/19671: [ 1736.564835][ T26] 2 locks held by syz-executor.2/19673: [ 1736.633677][ T26] [ 1736.638670][ T26] ============================================= [ 1736.638670][ T26] [ 1736.685753][ T26] NMI backtrace for cpu 1 [ 1736.690131][ T26] CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 1736.698134][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1736.708208][ T26] Call Trace: [ 1736.711503][ T26] [ 1736.714454][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1736.719234][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1736.724896][ T26] ? panic+0x84d/0x84d [ 1736.728989][ T26] ? nmi_cpu_backtrace+0x23b/0x4a0 [ 1736.734176][ T26] nmi_cpu_backtrace+0x46a/0x4a0 [ 1736.739393][ T26] ? __wake_up_klogd+0xd5/0x100 [ 1736.744289][ T26] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1736.750469][ T26] ? _printk+0xd1/0x111 [ 1736.754645][ T26] ? panic+0x84d/0x84d [ 1736.758731][ T26] ? __wake_up_klogd+0xcc/0x100 [ 1736.763605][ T26] ? panic+0x84d/0x84d [ 1736.767698][ T26] ? __rcu_read_unlock+0x92/0x100 [ 1736.772747][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1736.778917][ T26] nmi_trigger_cpumask_backtrace+0x181/0x2a0 [ 1736.784927][ T26] watchdog+0xe72/0xeb0 [ 1736.789175][ T26] kthread+0x3f6/0x4f0 [ 1736.793259][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1736.798306][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1736.802918][ T26] ret_from_fork+0x1f/0x30 [ 1736.807374][ T26] [ 1736.811333][ T26] Sending NMI from CPU 1 to CPUs 0: [ 1736.817387][ C0] NMI backtrace for cpu 0 [ 1736.817398][ C0] CPU: 0 PID: 4601 Comm: kworker/u4:8 Not tainted 5.15.152-syzkaller #0 [ 1736.817418][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1736.817428][ C0] Workqueue: ext4-rsv-conversion ext4_end_io_rsv_work [ 1736.817457][ C0] RIP: 0010:crc_41+0x0/0x1e [ 1736.817535][ C0] Code: ff ff f2 4d 0f 38 f1 93 a8 fe ff ff f2 4c 0f 38 f1 81 b0 fe ff ff f2 4c 0f 38 f1 8a b0 fe ff ff f2 4d 0f 38 f1 93 b0 fe ff ff 4c 0f 38 f1 81 b8 fe ff ff f2 4c 0f 38 f1 8a b8 fe ff ff f2 4d [ 1736.817562][ C0] RSP: 0018:ffffc90004eaf270 EFLAGS: 00000246 [ 1736.817576][ C0] RAX: 000000000000002a RBX: 00000000000003fc RCX: ffff88805166ad50 [ 1736.817587][ C0] RDX: ffff88805166aea0 RSI: 00000000000003fc RDI: ffffffff8147e25e [ 1736.817599][ C0] RBP: 0000000000000ffc R08: 0000000059654551 R09: 000000003c1e4e95 [ 1736.817618][ C0] R10: 000000003c1e4e95 R11: ffff88805166aff0 R12: ffff88805166a000 [ 1736.817630][ C0] R13: dffffc0000000000 R14: 1ffff920009d5e91 R15: 0000000000000ffc [ 1736.817642][ C0] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1736.817657][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1736.817669][ C0] CR2: 000000c00165d010 CR3: 000000001b572000 CR4: 00000000003506f0 [ 1736.817683][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1736.817692][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1736.817703][ C0] Call Trace: [ 1736.817708][ C0] [ 1736.817713][ C0] ? nmi_cpu_backtrace+0x39f/0x4a0 [ 1736.817735][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1736.817753][ C0] ? nmi_trigger_cpumask_backtrace+0x2a0/0x2a0 [ 1736.817774][ C0] ? unknown_nmi_error+0xd0/0xd0 [ 1736.817817][ C0] ? nmi_cpu_backtrace_handler+0x8/0x10 [ 1736.817834][ C0] ? nmi_handle+0xf7/0x370 [ 1736.817852][ C0] ? crc_42+0x1e/0x1e [ 1736.817866][ C0] ? default_do_nmi+0x62/0x150 [ 1736.817883][ C0] ? exc_nmi+0xab/0x120 [ 1736.817897][ C0] ? end_repeat_nmi+0x16/0x31 [ 1736.817919][ C0] ? crc_43+0x1e/0x1e [ 1736.817934][ C0] ? crc_42+0x1e/0x1e [ 1736.817949][ C0] ? crc_42+0x1e/0x1e [ 1736.817965][ C0] ? crc_42+0x1e/0x1e [ 1736.817980][ C0] [ 1736.817984][ C0] [ 1736.817990][ C0] crc32c_pcl_intel_update+0x79/0x270 [ 1736.818009][ C0] crypto_shash_update+0x1db/0x2a0 [ 1736.818061][ C0] ? crypto_shash_setkey+0x2b0/0x2b0 [ 1736.818078][ C0] ? __lock_acquire+0x1ff0/0x1ff0 [ 1736.818095][ C0] ? __might_sleep+0xc0/0xc0 [ 1736.818162][ C0] ? ext4_ext_try_to_merge_right+0x41e/0x800 [ 1736.818184][ C0] ext4_extent_block_csum_set+0x368/0x520 [ 1736.818205][ C0] ? ext4_ext_clear_bb+0x9b0/0x9b0 [ 1736.818222][ C0] ? ext4_ext_try_to_merge+0x1d5/0x670 [ 1736.818240][ C0] __ext4_ext_dirty+0xbe/0x1c0 [ 1736.818258][ C0] ext4_ext_map_blocks+0x39ac/0x7690 [ 1736.818288][ C0] ? ext4_ext_release+0x10/0x10 [ 1736.818303][ C0] ? read_lock_is_recursive+0x10/0x10 [ 1736.818320][ C0] ? __might_sleep+0xc0/0xc0 [ 1736.818336][ C0] ? __lock_acquire+0x1ff0/0x1ff0 [ 1736.818352][ C0] ? __wake_up+0x120/0x1c0 [ 1736.818377][ C0] ? ext4_es_lookup_extent+0x621/0xa40 [ 1736.818397][ C0] ext4_map_blocks+0xaad/0x1e00 [ 1736.818422][ C0] ? ext4_issue_zeroout+0x250/0x250 [ 1736.818443][ C0] ? jbd2__journal_start+0x5c0/0x5c0 [ 1736.818466][ C0] ext4_convert_unwritten_extents+0x2e0/0x6c0 [ 1736.818488][ C0] ? trace_ext4_fallocate_exit+0x200/0x200 [ 1736.818505][ C0] ? jbd2_journal_start_reserved+0x1d6/0x300 [ 1736.818526][ C0] ? __ext4_journal_start_reserved+0x238/0x420 [ 1736.818544][ C0] ext4_convert_unwritten_io_end_vec+0xfd/0x170 [ 1736.818565][ C0] ext4_end_io_rsv_work+0x368/0x6e0 [ 1736.818586][ C0] ? print_irqtrace_events+0x210/0x210 [ 1736.818600][ C0] ? _raw_spin_unlock_irqrestore+0xd9/0x130 [ 1736.818622][ C0] ? ext4_last_io_end_vec+0x70/0x70 [ 1736.818645][ C0] process_one_work+0x8a1/0x10c0 [ 1736.818689][ C0] ? worker_detach_from_pool+0x260/0x260 [ 1736.818710][ C0] ? _raw_spin_lock_irqsave+0x120/0x120 [ 1736.818727][ C0] ? kthread_data+0x4e/0xc0 [ 1736.818744][ C0] ? wq_worker_running+0x97/0x170 [ 1736.818762][ C0] worker_thread+0xaca/0x1280 [ 1736.818792][ C0] kthread+0x3f6/0x4f0 [ 1736.818807][ C0] ? rcu_lock_release+0x20/0x20 12:36:22 executing program 2: perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x3, 0x4, 0x4, 0x2, 0xffc0, 0x0, 0x3ff, 0x0, 0x416a}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x4) [ 1736.818824][ C0] ? kthread_blkcg+0xd0/0xd0 [ 1736.818840][ C0] ret_from_fork+0x1f/0x30 [ 1736.818865][ C0] [ 1737.263829][T12502] Bluetooth: hci4: command 0x0406 tx timeout [ 1737.903729][ T26] Kernel panic - not syncing: hung_task: blocked tasks [ 1737.910617][ T26] CPU: 1 PID: 26 Comm: khungtaskd Not tainted 5.15.152-syzkaller #0 [ 1737.918621][ T26] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 [ 1737.928795][ T26] Call Trace: [ 1737.932086][ T26] [ 1737.935027][ T26] dump_stack_lvl+0x1e3/0x2cb [ 1737.939731][ T26] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1737.945387][ T26] ? panic+0x84d/0x84d [ 1737.949483][ T26] panic+0x318/0x84d [ 1737.953392][ T26] ? schedule_preempt_disabled+0x20/0x20 [ 1737.959129][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1737.965308][ T26] ? fb_is_primary_device+0xcc/0xcc [ 1737.970525][ T26] ? arch_trigger_cpumask_backtrace+0x10/0x10 [ 1737.976620][ T26] ? nmi_trigger_cpumask_backtrace+0x221/0x2a0 [ 1737.982791][ T26] ? nmi_trigger_cpumask_backtrace+0x281/0x2a0 [ 1737.988965][ T26] ? nmi_trigger_cpumask_backtrace+0x286/0x2a0 [ 1737.995292][ T26] watchdog+0xeb0/0xeb0 [ 1737.999486][ T26] kthread+0x3f6/0x4f0 [ 1738.003699][ T26] ? hungtask_pm_notify+0x50/0x50 [ 1738.008751][ T26] ? kthread_blkcg+0xd0/0xd0 [ 1738.013367][ T26] ret_from_fork+0x1f/0x30 [ 1738.017862][ T26] [ 1738.021140][ T26] Kernel Offset: disabled [ 1738.025574][ T26] Rebooting in 86400 seconds..